Cybersecurity Testbeds for IoT: A Systematic Literature Review and Taxonomy

被引:0
|
作者
de Santana, Khalil G. Queiroz [1 ]
Schwarz, Marcos [2 ]
Wangham, Michelle Silva [1 ]
机构
[1] Univ Vale Itajai, Itajai, Brazil
[2] Rede Nacl Ensino & Pesquisa, Rio De Janeiro, Brazil
基金
巴西圣保罗研究基金会;
关键词
Testbed; IoT; Cybersecurity; Systematic Literature Review; Taxonomy; SECURITY; INTERNET;
D O I
10.5753/jisa.2024.4363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers across the globe are carrying out numerous experiments related to cybersecurity, such as botnet dispersion, intrusion detection systems powered by machine learning, and others, to explore these topics in many different contexts and environmental settings. One current research topic is the behavior of Internet of Things (IoT) devices, as they increasingly become a common feature of homes, offices, and companies.. Network testing environments which are designated as testbeds, are boosting the effectiveness of network research. However, exploratory studies in IoT cybersecurity may include a wide range of requirements. This article seeks to carry out a survey of IoT cybersecurity testbeds. A critical systematic literature review was conducted to select relevant articles, by applying a novel taxonomy to classify the testbeds. The surveyed testbeds are classified in terms of their primary target domain and other features such as fidelity, heterogeneity, scalability, security, reproducibility, flexibility, and measurability. Furthermore, we have compared the testbeds with regard to each feature. Thus, the main contribution made by this study lies in a) the insights it provides into the state-of-the-art in IoT cybersecurity testbeds, and b) the emphasis laid on the main benefits and limitations that were found in the surveyed testbeds.
引用
收藏
页码:450 / 473
页数:24
相关论文
共 50 条
  • [21] Blockchain in healthcare and IoT: A systematic literature review
    Adere, Endale Mitiku
    ARRAY, 2022, 14
  • [22] Cybersecurity maturity model: Systematic literature review and a proposed model
    Buyukozkan, Gulcin
    Guler, Merve
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2025, 213
  • [23] Application of Large Language Models in Cybersecurity: A Systematic Literature Review
    Hasanov, Ismayil
    Virtanen, Seppo
    Hakkala, Antti
    Isoaho, Jouni
    IEEE ACCESS, 2024, 12 : 176751 - 176778
  • [24] The impact of time pressure on cybersecurity behaviour: a systematic literature review
    Chowdhury, Noman H.
    Adam, Marc T. P.
    Skinner, Geoffrey
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) : 1290 - 1308
  • [25] Cybersecurity Awareness Through Serious Games: A Systematic Literature Review
    Moumouh, Chaimae
    Chkouri, Mohamed Yassin
    Fernandez-Aleman, Jose L.
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 190 - 199
  • [26] Cybersecurity Analysis via Process Mining: A Systematic Literature Review
    Macak, Martin
    Daubner, Lukas
    Sani, Mohammadreza Fani
    Buhnova, Barbora
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2021, PT I, 2022, 13087 : 393 - 407
  • [27] Machine Learning and Big Data for Cybersecurity: Systematic Literature Review
    El Bouchtioui, En Naji
    Bentaleb, Asmae
    Abouchabaka, Jaafar
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 1, 2024, 1098 : 97 - 106
  • [28] Unravelling the three lines model in cybersecurity: a systematic literature review
    Valkenburg, Bert
    Bongiovanni, Ivano
    COMPUTERS & SECURITY, 2024, 139
  • [29] The social contract theory meets cybersecurity: systematic literature review
    Kleiner, Jan
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2024,
  • [30] Application of cognitive computing in healthcare, cybersecurity, big data and IoT: A literature review
    Sreedevi, A. G.
    Harshitha, T. Nitya
    Sugumaran, Vijayan
    Shankar, P.
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (02)