RD Velho IoT Security model secure technology, process and tools

Esineiden Internetin (IoT) laitteiden määrä on kasvanut dramaattisesti viime vuosina ja arvioiden mukaan laitteiden määrä tulee kasvamaan eksponentiaalisesti tulevina vuosina. IoT-liiketoiminnassa IoT-laitteiden skaalautuvuutta ja standardointia on pidetty suurena ongelmana valmistajien näkökulmasta...

Full description

Bibliographic Details
Main Author: Kellomäki, Tarmo
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2019
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/64548
_version_ 1826225722443694080
author Kellomäki, Tarmo
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Kellomäki, Tarmo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kellomäki, Tarmo Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Kellomäki, Tarmo
datasource_str_mv jyx
description Esineiden Internetin (IoT) laitteiden määrä on kasvanut dramaattisesti viime vuosina ja arvioiden mukaan laitteiden määrä tulee kasvamaan eksponentiaalisesti tulevina vuosina. IoT-liiketoiminnassa IoT-laitteiden skaalautuvuutta ja standardointia on pidetty suurena ongelmana valmistajien näkökulmasta, mikä on osittain vaikuttanut turvallisuuden laiminlyöntiin. Tutkimuksessa keskitytään IoT turvallisuuteen, joka kattaa IoTteknologian, kehittämisprosessit ja tietoturvatyökalut. Tutkimuksessa tarkastellaan nykyistä IoT:n turvallisuustilannetta, tietoturvallisuusstandardeja ja IoT:n vaatimuksia sekä turvallisia alalla käytettyjä kehittämismenetelmiä ja välineitä. Tätä tietämystä käytetään tutkimuksen DSR-prosessissa uuden turvallisuusmallin laatimisessa, joka tukee tutkimusasiakkaan IoT-tietoturvan kehittämistä. Tutkimuksen asiakas on RD Velho -yhtiö, joka toimii IoT-liiketoiminnassa. RD Velho tuottaa IoT-ratkaisuja, jotka perustuvat Arm Mbed- ja Pelion IoT - teknologiaan. Asiakas suhtautuu vakavasti tuotteidensa turvallisuuteen ja haluaa varmistaa sen sekä teknologian tasolla, kehityksessä että testauksessa. Tutkimuksessa keskitytään tarkastelemaan asiakkaan IoT-tietoturvaa teknisen turvallisuuden ja kehityksen turvatoimien nykyisen tietämyksen avulla. Koska tietoturvatestaus on tärkeä rooli turvallisuustilanteen tarkistamisessa, sitä käsitellään myös tässä työssä. Tutkimuksen päätuotos on asiakkaalle luotu RD Velho IoT Security model -turvallisuusmalli, joka esittää miten IoT-teknologian ja kehittämisprosessin turvallisuutta voidaan parantaa asianmukaisten työkalujen tukemana. The number of Internet of Things (IoT) devices has grown dramatically over the past few years and according to estimates the number of devices will increase exponentially in the coming years. In IoT business, scalability and standardization of IoT devices has been regarded as a major problem by the manufacturers’ point of view, which has partly influenced neglecting security. This research focuses on the security of IoT covering IoT technology, development processes and supporting security tools. The research examines the security landscape of today’s IoT, security standards and requirements of IoT and secure development methods and tools that are used in the field. This body of knowledge is used in the research’s DSR process in formulating a new security model to support the research client’s IoT security posture enhancements. The client for the research is a company called RD Velho which is in IoT business. RD Velho produces IoT solutions that are based on Arm Mbed and Pelion IoT technology. The client takes seriously the security in its products and it wants to verify it in both technology level, development and testing process level. The research concentrates on examining the client’s IoT security through the lens of current knowledge about technical security and development security. Since security testing plays important role in verifying security posture, it is also discussed in this thesis. The main result of this research is “RD Velho IoT Security model”, which brings forward suggestions how to improve the security of the client’s IoT technology and development processes with proper security tools.
first_indexed 2019-08-19T08:21:14Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Costin, Andrei", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Nyk\u00e4nen, Riku", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kellom\u00e4ki, Tarmo", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-12T08:24:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-12T08:24:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64548", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Esineiden Internetin (IoT) laitteiden m\u00e4\u00e4r\u00e4 on kasvanut dramaattisesti viime\nvuosina ja arvioiden mukaan laitteiden m\u00e4\u00e4r\u00e4 tulee kasvamaan eksponentiaalisesti\ntulevina vuosina. IoT-liiketoiminnassa IoT-laitteiden skaalautuvuutta ja\nstandardointia on pidetty suurena ongelmana valmistajien n\u00e4k\u00f6kulmasta, mik\u00e4\non osittain vaikuttanut turvallisuuden laiminly\u00f6ntiin.\nTutkimuksessa keskityt\u00e4\u00e4n IoT turvallisuuteen, joka kattaa IoTteknologian,\nkehitt\u00e4misprosessit ja tietoturvaty\u00f6kalut. Tutkimuksessa tarkastellaan\nnykyist\u00e4 IoT:n turvallisuustilannetta, tietoturvallisuusstandardeja ja IoT:n\nvaatimuksia sek\u00e4 turvallisia alalla k\u00e4ytettyj\u00e4 kehitt\u00e4mismenetelmi\u00e4 ja v\u00e4lineit\u00e4.\nT\u00e4t\u00e4 tiet\u00e4myst\u00e4 k\u00e4ytet\u00e4\u00e4n tutkimuksen DSR-prosessissa uuden turvallisuusmallin\nlaatimisessa, joka tukee tutkimusasiakkaan IoT-tietoturvan kehitt\u00e4mist\u00e4.\nTutkimuksen asiakas on RD Velho -yhti\u00f6, joka toimii IoT-liiketoiminnassa.\nRD Velho tuottaa IoT-ratkaisuja, jotka perustuvat Arm Mbed- ja Pelion IoT -\nteknologiaan. Asiakas suhtautuu vakavasti tuotteidensa turvallisuuteen ja haluaa\nvarmistaa sen sek\u00e4 teknologian tasolla, kehityksess\u00e4 ett\u00e4 testauksessa.\nTutkimuksessa keskityt\u00e4\u00e4n tarkastelemaan asiakkaan IoT-tietoturvaa teknisen\nturvallisuuden ja kehityksen turvatoimien nykyisen tiet\u00e4myksen avulla.\nKoska tietoturvatestaus on t\u00e4rke\u00e4 rooli turvallisuustilanteen tarkistamisessa,\nsit\u00e4 k\u00e4sitell\u00e4\u00e4n my\u00f6s t\u00e4ss\u00e4 ty\u00f6ss\u00e4.\nTutkimuksen p\u00e4\u00e4tuotos on asiakkaalle luotu RD Velho IoT Security model\n-turvallisuusmalli, joka esitt\u00e4\u00e4 miten IoT-teknologian ja kehitt\u00e4misprosessin\nturvallisuutta voidaan parantaa asianmukaisten ty\u00f6kalujen tukemana.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The number of Internet of Things (IoT) devices has grown dramatically over the\npast few years and according to estimates the number of devices will increase\nexponentially in the coming years. In IoT business, scalability and standardization\nof IoT devices has been regarded as a major problem by the manufacturers\u2019\npoint of view, which has partly influenced neglecting security.\nThis research focuses on the security of IoT covering IoT technology, development\nprocesses and supporting security tools. The research examines the\nsecurity landscape of today\u2019s IoT, security standards and requirements of IoT\nand secure development methods and tools that are used in the field. This body\nof knowledge is used in the research\u2019s DSR process in formulating a new security\nmodel to support the research client\u2019s IoT security posture enhancements.\nThe client for the research is a company called RD Velho which is in IoT\nbusiness. RD Velho produces IoT solutions that are based on Arm Mbed and\nPelion IoT technology. The client takes seriously the security in its products and\nit wants to verify it in both technology level, development and testing process\nlevel.\nThe research concentrates on examining the client\u2019s IoT security through\nthe lens of current knowledge about technical security and development security.\nSince security testing plays important role in verifying security posture, it is\nalso discussed in this thesis.\nThe main result of this research is \u201cRD Velho IoT Security model\u201d, which\nbrings forward suggestions how to improve the security of the client\u2019s IoT technology\nand development processes with proper security tools.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-12T08:24:02Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-12T08:24:02Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "140", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Security model", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security testing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Arm", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "RD Velho IoT Security model : secure technology, process and tools", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906123149", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet of things", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston <a href=\"https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat\">arkistoty\u00f6asemalta</a>.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "<br><br>The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival <a href=\"https://kirjasto.jyu.fi/en/workspaces/facilities\">workstation</a> at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_64548
language eng
last_indexed 2025-02-18T10:54:29Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Kellomäki, Tarmo RD Velho IoT Security model : secure technology, process and tools Security model security testing Arm Tietotekniikka Mathematical Information Technology 602 esineiden internet kyberturvallisuus Internet of things cyber security
title RD Velho IoT Security model : secure technology, process and tools
title_full RD Velho IoT Security model : secure technology, process and tools
title_fullStr RD Velho IoT Security model : secure technology, process and tools RD Velho IoT Security model : secure technology, process and tools
title_full_unstemmed RD Velho IoT Security model : secure technology, process and tools RD Velho IoT Security model : secure technology, process and tools
title_short RD Velho IoT Security model
title_sort rd velho iot security model secure technology process and tools
title_sub secure technology, process and tools
title_txtP RD Velho IoT Security model : secure technology, process and tools
topic Security model security testing Arm Tietotekniikka Mathematical Information Technology 602 esineiden internet kyberturvallisuus Internet of things cyber security
topic_facet 602 Arm Internet of things Mathematical Information Technology Security model Tietotekniikka cyber security esineiden internet kyberturvallisuus security testing
url https://jyx.jyu.fi/handle/123456789/64548 http://www.urn.fi/URN:NBN:fi:jyu-201906123149
work_keys_str_mv AT kellomäkitarmo rdvelhoiotsecuritymodelsecuretechnologyprocessandtools