TY - GEN
T1 - Security oriented methodology for designing internet of things systems
AU - Robles-Ramirez, David A.
AU - Escamilla-Ambrosio, Ponciano J.
AU - Acosta-Bermejo, Raúl
AU - Aguirre-Anaya, Eleazar
AU - Rodríguez-Mota, Abraham
AU - Reyes-Torres, Jesus J.
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018.
PY - 2018
Y1 - 2018
N2 - The current increasing number of services and systems developed for the Internet of Things (IoT) involve several challenges in interconnectivity, heterogeneous networks and security. Security is one of the most important issues to consider in IoT systems because most of the critical information such as passwords, identities or even personal information could be exposed by an attacker. This proposal is a security methodology for IoT systems that defines a process to establish rules, mechanisms and controls in every stage of IoT systems development. This methodology has three main parts: definition of the system and its abstraction model, security modelling attached to the general model, system implementation and continuous security review. The whole methodology has more specific steps including our security model extension called IoTsec that is a model-based visual security oriented representation of IoT systems which can be used as an extension of an abstract model of an IoT system to model security.
AB - The current increasing number of services and systems developed for the Internet of Things (IoT) involve several challenges in interconnectivity, heterogeneous networks and security. Security is one of the most important issues to consider in IoT systems because most of the critical information such as passwords, identities or even personal information could be exposed by an attacker. This proposal is a security methodology for IoT systems that defines a process to establish rules, mechanisms and controls in every stage of IoT systems development. This methodology has three main parts: definition of the system and its abstraction model, security modelling attached to the general model, system implementation and continuous security review. The whole methodology has more specific steps including our security model extension called IoTsec that is a model-based visual security oriented representation of IoT systems which can be used as an extension of an abstract model of an IoT system to model security.
KW - Diagrams
KW - Internet of things
KW - Methodology
KW - Model
KW - Security
KW - Software engineering
KW - SysML
KW - System modelling
KW - UML
UR - http://www.scopus.com/inward/record.url?scp=85044482475&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-73323-4_10
DO - 10.1007/978-3-319-73323-4_10
M3 - Contribución a la conferencia
SN - 9783319733227
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 96
EP - 107
BT - Smart Technology - 1st International Conference, MTYMEX 2017, Proceedings
A2 - Lozoya-Santos, Jorge
A2 - Torres Guerrero, Francisco
A2 - Neira-Tovar, Leticia
A2 - Gonzalez Mendivil, Eduardo
A2 - Ramirez Flores, Pablo G.
A2 - Martin-Gutierrez, Jorge
PB - Springer Verlag
T2 - 1st EAI International Conference on Smart Technology, MTYMEX 2017
Y2 - 24 May 2017 through 26 May 2017
ER -