Abstract

In this paper, an approach referred to as IoTsecM is proposed. This proposal is a UML/SysML extension for security requirements modeling within the analysis stage in a waterfall development life cycle in a Model-Based Systems Engineering Approach. IoTsecM allows the security requirements representation in two very well-known modeling languages, UML and SysML. With the utilization of this extension, IoT developers can consider the security requirements from the analysis stage in the design process of IoT systems. IoTsecM allows IoT systems to be designed considering possible threats and the corresponding security requirements analysis. The applicability of IoTsecM is demonstrated through applying it to analyze and represent the security requirements in an IoT real-life system in the context of collaborative autonomous vehicles in smart cities. In this use case, IoTsecM was able to represent the security requirements identified within the system architecture elements, in which all countermeasures identified were depicted using the proposed IoTsecM profile.

Highlights

  • The Internet of Things (IoT) represents a radical transformation of the existing Internet into an interconnected network of “Smart Objects,” generically referred to as “Things.” IoT systems collect data from the environment and interact with the physical world, and use the Internet to provide services for information transfer, processing, analytics, storage, and applications [1]

  • To validate the applicability of Internet of Things Security Modeling (IoTsecM), it has been employed to model the security requirements within the Flourish project [6], whose objective is to find innovative solutions related to customers interaction, connectivity, data analytics, and safe design for collaborative autonomous vehicles (CAVs) in a smart city domain

  • From the security requirements point of view, the need for confidentiality, integrity, and authentication mainly depends on the security goals for each application at hand

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) represents a radical transformation of the existing Internet into an interconnected network of “Smart Objects,” generically referred to as “Things.” IoT systems collect data from the environment (they have sensing capabilities) and interact with the physical world (they can perform actuation, command, and control over other things), and use the Internet to provide services for information transfer, processing, analytics, storage, and applications [1]. In [4], a review of the main security threats in IoT and cyber-attacks performed on IoT applications was presented It should be recognized that IoT security is both multifaceted and dependent on the effort to standardize IoT security tools In this context, an approach referred to as Internet of Things Security Modeling (IoTsecM) is proposed in this work. To validate the applicability of IoTsecM, it has been employed to model the security requirements within the Flourish project [6], whose objective is to find innovative solutions related to customers interaction, connectivity, data analytics, and safe design for collaborative autonomous vehicles (CAVs) in a smart city domain.

RELATED WORKS
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call