@inproceedings {1701, title = {A comprehensive methodology for deploying IoT honeypots}, booktitle = {15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018)}, volume = {LNCS 11033}, year = {2018}, month = {09/2018}, pages = {229{\textendash}243}, publisher = {Springer Nature Switzerland AG}, organization = {Springer Nature Switzerland AG}, address = {Regensburg (Germany)}, abstract = {

Recent news have raised concern regarding the security on the IoT field. Vulnerabilities in devices are arising and honeypots are an excellent way to cope with this problem. In this work, current solutions for honeypots in the IoT context, and other solutions adaptable to it are analyzed in order to set the basis for a methodology that allows deployment of IoT honeypot.

}, keywords = {Honeypot, IoT, methodology, security}, doi = {https://doi.org/10.1007/978-3-319-98385-1_16}, author = {Antonio Acien and Ana Nieto and Gerardo Fernandez and Javier Lopez} } @inproceedings {1578, title = {Testigo digital: delegaci{\'o}n vinculante de evidencias electr{\'o}nicas para escenarios IoT}, booktitle = {II Jornadas Nacionales de Investigaci{\'o}n en Ciberseguridad (JNIC 2016)}, year = {2016}, month = {06/2016}, pages = {109-116}, abstract = {

En un mundo en el que los usuarios dependen cada vez m{\'a}s de sus dispositivos, {\'e}stos almacenan gran cantidad de datos y son una fuente muy valiosa de informaci{\'o}n sobre su entorno. Sin embargo, la heterogeneidad y la densidad de los objetos conectados, caracter{\'\i}sticas propias de la Internet de las Cosas (IoT), sirven de velo para ocultar conductas maliciosas que afectan a estos dispositivos, sin que quede rastro de tales acciones. En este art{\'\i}culo definimos el concepto de testigo digital: funcionalidad que permitir{\'a} a los dispositivos personales y otros objetos colaborar para implementar una cadena de custodia digital en la IoT. El fin perseguido es ofrecer soluciones que mitiguen los efectos de la ciberdelincuencia, ampar{\'a}ndose en la colaboraci{\'o}n de los dispositivos con arquitecturas de seguridad embebidas para alertar de conductas maliciosas, y dejar constancia de {\'e}stas.

}, keywords = {computaci{\'o}n forense, elemento seguro, Evidencia electr{\'o}nica, IoT, no-repudio}, isbn = {978-84-608-8070-7}, url = {http://ucys.ugr.es/jnic2016/docs/ActasJNIC2016.pdf}, author = {Ana Nieto and Rodrigo Roman and Javier Lopez} } @article {nietoscn13, title = {Analysis and Taxonomy of Security/QoS tradeoff solutions for the Future Internet}, journal = {Security and Communication Networks (SCN) Journal}, volume = {7}, year = {2013}, pages = {2778-2803}, publisher = {Wiley-Blackwell}, abstract = {

Motivated by the growing convergence of diverse types of networks and the rise of concepts such as Future Internet (FI), in this paper we analyse the coexistence of security mechanisms and Quality of Service (QoS) mechanisms in resourceconstrained networks, that are relevant types of networks within the FI environment. More precisely, we analyse the current state of the research on security and QoS in the integration of Wireless Sensor Networks (WSNs), Mobile Ad-Hoc Networks (MANETs) and cellular networks. Furthermore, we propose a taxonomy to identify similarities among these technologies, as well as the requirements for network interconnection. As a result, we define a dependency-based model for the analysis of Security and QoS tradeoff, and also define a high-level integration architecture for networks in the FI setting. The final goal is to provide a critical point of view that allows to assess whether such an integration of networks can be both secure and efficient.

}, keywords = {cellular networks, IoT, MANET, QoS, security, WSN}, issn = {1939-0114}, doi = {10.1002/sec.809}, url = {http://onlinelibrary.wiley.com/doi/10.1002/sec.809/abstract?deniedAccessCustomisedMessage=\&userIsAuthenticated=false}, author = {Ana Nieto and Javier Lopez} }