Show simple item record

dc.contributor.authorDaniel Díaz López
dc.contributor.authorBlanco Uribe, María
dc.contributor.authorSantiago Cely, Claudia
dc.contributor.authorTarquino Murgueitio, Daniel
dc.contributor.authorGarcia Garcia, Edwin
dc.contributor.authorNespoli, Pantaleone
dc.contributor.authorGómez Mármol, Félix
dc.description.abstractUndoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.eng
dc.description.abstractSin lugar a dudas, la adopción del paradigma de Internet de las cosas (IoT) ha impactado en nuestra la vida cotidiana, rodeándonos de objetos inteligentes. Así, las potencialidades de este nuevo mercado atrajeron la industria, por lo que muchas empresas desarrollaron sus propias plataformas de IoT con el objetivo de ayudar a IoT desarrolladores de servicios. En la multitud de plataformas posibles, seleccionar la más adecuada para implementar un servicio específico no es sencillo, especialmente desde una perspectiva de seguridad. Este artículo analiza algunas de las propuestas más destacadas en el mercado de plataformas de IoT, realizando un análisis en profundidad comparación de seguridad utilizando cinco criterios comunes. Estos criterios se detallan en subcriterios, de modo que se pueden utilizar como base para el desarrollo de un servicio de IoT seguro. Aprovechando el conocimiento recopilados de nuestro estudio en profundidad, tanto los investigadores como los desarrolladores pueden seleccionar la plataforma de IoT que se adapta mejor a sus necesidades. Adicionalmente, se implementa un servicio de IoT para monitorear vuelos comerciales en dos plataformas de IoT previamente analizadas, dando un nivel de detalle adecuado para representar una pauta sólida para futuros desarrolladores de
dc.format.extent34 páginasspa
dc.rightsThis article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (
dc.titleDeveloping Secure IoT Services: A Security-Oriented Review of IoT Platformsspa
dc.typeArtículo de revistaspa
dc.description.notesReceived: 11 October 2018; Accepted: 30 October 2018; Published: 27 November 2018spa
dc.description.notesFaculty of Computer Science, Colombian School of Engineering Julio Garavito, Bogotá, 111166, Colombia; (M.B.U.); (C.S.C.); (D.T.M.); (E.G.G.) Faculty of Computer Science, University of Murcia, 30100 Murcia, Spain; (P.N.); (F.G.M.) * Correspondence:; Tel.: +571-6683600-262spa
dc.relation.citationeditionVolume 10, Número 12, Noviembre 2018spa
dc.relation.referencesGartner. Gartner’s 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage; Gartner: Stamford, CT, USA, 2016spa
dc.relation.referencesLi, S.; Da Xu, L.; Zhao, S. The Internet of Things: A Survey; Springer: New York, NY, USA, 2015; pp. 243–
dc.relation.referencesYelamarthi, K.; Aman, M.S.; Abdelgawad, A. An application-driven modular IoT architecture. Wirel. Commun. Mob. Comput. 2017, 2017, 1350929. [CrossRef] [PubMed]spa
dc.relation.referencesGomes, B.; Muniz, L.; da Silva e Silva, F.J.; Ríos, L.E.T.; Endler, M. A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living. In Proceedings of the 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakech, Morocco, 2–4 June 2015; pp. 1–
dc.relation.referencesYaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [CrossRef]spa
dc.relation.referencesPołap, D.; K ˛esik, K.; Ksi ˛azek, K.; Wo´zniak, M. Obstacle Detection as a Safety Alert in Augmented Reality ˙ Models by the Use of Deep Learning Techniques. Sensors 2017, 17, 2803. [CrossRef] [PubMed]spa
dc.relation.referencesWo´zniak, M.; Połap, D. Object detection and recognition via clustered features. Neurocomputing 2018, 320, 76–84. [CrossRef]spa
dc.relation.referencesZarpelo, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A Survey of Intrusion Detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [CrossRef]spa
dc.relation.referencesAbdelgawad, A.; Yelamarthi, K. Internet of things (IoT) platform for structure health monitoring. Wirel. Commun. Mob. Comput. 2017, 2017, 6560797. [CrossRef]spa
dc.relation.referencesPołap, D.; Winnicka, A.; Serwata, K.; K ˛esik, K.; Wo´zniak, M. An Intelligent System for Monitoring Skin Diseases. Sensors 2018, 18, 2552. [CrossRef] [PubMed]spa
dc.relation.referencesCharmonman, S.; Mongkhonvanit, P. Special consideration for Big Data in IoE or Internet of Everything. In Proceedings of the 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015), Bangkok, Thailand, 18–20 November 2015; pp. 147–
dc.relation.referencesWollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [CrossRef]spa
dc.relation.referencesJu, J.; Kim, M.S.; Ahn, J.H. Prototyping Business Models for IoT Service. Procedia Comput. Sci. 2016, 91, 882–890. [CrossRef]spa
dc.relation.referencesGupta, H.; Vahid Dastjerdi, A.; Ghosh, S.K.; Buyya, R. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw. Pract. Exp. 2017, 47, 1275–1296. [CrossRef]spa
dc.relation.referencesSarkar, S.; Chatterjee, S.; Misra, S. Assessment of the Suitability of Fog Computing in the Context of Internet of Things. IEEE Trans. Cloud Comput. 2018, 6, 46–59. [CrossRef]spa
dc.relation.referencesNespoli, P.; Papamartzivanos, D.; Gómez Mármol, F.; Kambourakis, G. Optimal Countermeasures Selection against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks. IEEE Commun. Surv. Tutor. 2018, 20, 1361–1396. [CrossRef]spa
dc.relation.referencesAl-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]spa
dc.relation.referencesXu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [CrossRef]spa
dc.relation.referencesPerera, C.; Liu, C.H.; Jayawardena, S. The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey. IEEE Trans. Emerg. Top. Comput. 2015, 3, 585–598. [CrossRef]spa
dc.relation.referencesGanguly, P. Selecting the right IoT cloud platform. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 316–
dc.relation.referencesGuth, J.; Breitenbücher, U.; Falkenthal, M.; Leymann, F.; Reinfurt, L. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT), Paris, France, 23–25 November 2016; pp. 1–
dc.relation.referencesDerhamy, H.; Eliasson, J.; Delsing, J.; Priller, P. A survey of commercial frameworks for the Internet of Things. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–
dc.relation.referencesYaqoob, I.; Ahmed, E.; ur Rehman, M.H.; Ahmed, A.I.A.; Al-garadi, M.A.; Imran, M.; Guizani, M. The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Netw. 2017, 129, 444–458. [CrossRef]spa
dc.relation.referencesAmmar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [CrossRef]spa
dc.relation.referencesDíaz López, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Morón Castro, S.; Nespoli, P.; Gómez Mármol, F. Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [CrossRef]spa
dc.relation.referencesBeltran, V.; Skarmeta, A.; Ruiz, P. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT. Wirel. Commun. Mob. Comput. 2017, 2017, 3859836. [CrossRef]spa
dc.relation.referencesFerrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Netw. 2017, 2017, 6562953. [CrossRef]spa
dc.relation.referencesNespoli, P.; Zago, M.; Huertas Celdrán, A.; Gil Pérez, M.; Gómez Mármol, F.; García Clemente, F.J. A Dynamic Continuous Authentication Framework in IoT-Enabled Environments. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October 2018spa
dc.relation.referencesBoneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); LNCS: Berlin, Germany, 2011; Volume 6597, pp. 253–
dc.relation.referencesSaxena, N.; Choi, B.J.; Lu, R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016, 11, 907–921. [CrossRef]spa
dc.relation.referencesGoldstein, J.; Pagan, F.; Short, J. Systems and Methods for Providing Dynamic Network Authorization Authentication and Accounting. Patent EP20000973771, 20 October
dc.relation.referencesSforzin, A.; Gómez Mármol, F.; Conti, M.; Bohli, J.M. RPiDS: Raspberry Pi IDS—A Fruitful Intrusion Detection System for IoT. In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), Toulouse, France, 18–21 July 2016; pp. 440–
dc.relation.referencesUseche Peláez, D.; Díaz López, D.; Nespoli, P.; Gómez Mármol, F. TRIS: A Three-Rings IoT Sentinel to protect against cyber-threats. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October
dc.relation.referencesHunke, N.; Rüßmann, M.; Schmieg, F.; Bhatia, A.; Kalra, N. Winning in IoT: It’s All about the Business Processes. Available online: (accessed on 25 October 2018).spa
dc.relation.referencesLucero, S. IoT Platforms: Enabling the Internet of Things; IHS Technology: Phoenix, AZ, USA,
dc.relation.referencesWootton, C. Samsung ARTIK Reference: The Definitive Developers Guide; Apress: New York, NY, USA, 2016; p. 409spa
dc.relation.referencesWootton, C. Beginning Samsung ARTIK—A Guide to Developers; Apress: New York, NY, USA, 2016; p.
dc.relation.referencesKurniawan, A. Learning AWS IoT: Effectively Manage Connected Devices on the AWS Cloud Using Services Such as AWS Greengrass, AWS Button, Predictive Analytics and Machine Learning; Packt Publishing Ltd.: Birmingham, UK, 2018; p. 278spa
dc.relation.referencesTarneberb, W.; Chandrasekaran, V.; Humpherey, M. Experiences Creating a Framework for Smart Traffic Control using AWS IoT. In Proceedings of the 2016 ACM 9th International Conference on Utility and Cloud Computing, Shanghai, China, 6–9 December 2016; pp. 63–
dc.relation.referencesAzraq, A.; Chughtai, S.; Mashhour, A.; V Nguyen, D.; Dos Santos, R.M. Enhancing the IBM Power Systems Platform with IBM Watson Services; IBM Redbooks: New York, NY, USA, 2018; p.
dc.relation.referencesRavulavaru, A. Enterprise Internet of Things Handbook: Build End-to-End IoT Solutions Using Popular IoT Platforms; Packt Publishing: Birmingham, UK,
dc.relation.referencesPratimRay, P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2016, 1, 35–
dc.relation.referencesVossen, G.; Schonthaler, F.; Dillon, S. The Web at Graduation and Beyond: Business Impacts and Developments; Springer: New York, NY, USA, 2016spa
dc.relation.referencesEVRYTHNG IoT Smart Products Platform. Available online: (accessed on 12 July 2018).spa
dc.relation.referencesGuinard, D.; Trifa, V. Building the Web of Things; Manning Publications Co.: Greenwich, CT, USA,
dc.relation.referencesDweet—Data Sharing for IoT. Available online: (accessed on 12 September 2018).spa
dc.relation.referencesFreeboard—Dashboards for the Internet of Things. Available online: (accessed on 1 September 2018)spa
dc.relation.referencesBlackstock, M.; Lea, R. Toward a Distributed Data Flow Platform for the Web of Things (Distributed Node-RED). In Proceedings of the 5th International Workshop on Web of Things (WoT ’14), Cambridge, MA, USA, 8 October 2014; pp. 34–39spa
dc.relation.referencesYasumoto, K.; Yamaguchi, H.; Shigeno, H. Survey of Real-Time Processing Technologies of IoT Data Streems. J. Inf. Process. 2016, 24, 195–
dc.relation.referencesKamal, R. Internet of Thinks: Architecture and Design Principles; McGraw Hill Education: New York, NY, USA,
dc.relation.referencesKocovic, P.; Behringer, R.; Ramachandran, M.; Mihajlovic, R. Emerging Trends and Applications of the Internet of Things; IGI Global: Hershey, PA, USA,
dc.relation.referencesMinerauda, J.; Mazhelisb, O.; Suc, X.; Tarkomaa, S. A gap analysis of Internet-of-Things platforms. Comput. Commun. 2016, 89–90, 5–16. [CrossRef]spa
dc.relation.referencesMavromoustakis, C.X.; Mastorakis, G.; Dobre, C. Advances in Mobile Cloud Computing and Big Data in the 5G Era; Springer: New York, NY, USA,
dc.relation.referencesMartino, B.D.; Li, K.C.; Yang, L.T.; Esposito, A. Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives; Springer: New York, NY, USA, 2017spa
dc.relation.referencesGeng, H. Internet of Things and Data Analytics Handbook; John Wiley & Sons: New York, NY, USA, 2017spa
dc.relation.referencesSpitzer, C.; Ferrell, U.; Ferrell, T. Digital Avionics Handbook, 3rd ed.; CRC Press: Boca Raton, FL, USA,
dc.relation.referencesSoro, A.; Ambe, A.H.; Brereton, M. Minding the Gap: Reconciling Human and Technical Perspectives on the IoT for Healthy Ageing. Wirel. Commun. Mob. Comput. 2017, 2017, 7439361. [CrossRef]spa
dc.relation.referencesCao, T.D.; Hoang, H.H.; Huynh, H.X.; Nguyen, B.M.; Pham, T.V.; Tran-Minh, Q.; Tran, V.T.; Truong, H.L. Iot services for solving critical problems in vietnam: A research landscape and directions. IEEE Internet Comput. 2016, 20, 76–81. [CrossRef]spa
dc.relation.referencesThacker, S.; Pant, R.; Hall, J.W. System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures. Reliab. Eng. Syst. Saf. 2017, 167, 30–41. [CrossRef]spa
dc.rights.creativecommonsAtribución 4.0 Internacional (CC BY 4.0)spa
dc.subject.armarcInternet de las cosasspa
dc.subject.armarcSeguridad informáticaspa
dc.subject.proposalInternet of Thingseng
dc.subject.proposalIoT platformseng
dc.subject.proposalInformation securityeng
dc.subject.proposalIoT securityeng

Files in this item


This item appears in the following Collection(s)

Show simple item record

This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (
Except where otherwise noted, this item's license is described as This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (