Skip to main content

2018 | OriginalPaper | Buchkapitel

A Security Requirements Library for the Development of Internet of Things (IoT) Applications

verfasst von : Massila Kamalrudin, Asma Asdayana Ibrahim, Safiah Sidek

Erschienen in: Requirements Engineering for Internet of Things

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s era, there is a rapid increase in the demand for IoT applications. Thus, securing the information content delivered among various entities involved in the IoT applications development has become an important issue. It is also identified that there is a high cost of implementing a secured IoT application as it requires efforts, skills and knowledge to understand the security concern, especially when developers and requirement engineers do not have any formal training in software engineering and eliciting security requirements. In addition, requirements engineers who are unfamiliar with the IoT applications confront problems to elicit accurate security requirements to avoid misinterpretations. Motivated by these issues, this paper presents the development of a new IoT security requirements library of security requirement for the development of IoT applications. Using an industry scenario, the utilities of the library demonstrated the elicitation of security requirements for each of the IoT attributes of specific business applications domains.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat GSM Association, IoT Security Guidelines Overview Document (2016) GSM Association, IoT Security Guidelines Overview Document (2016)
2.
Zurück zum Zitat Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015) Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015)
3.
Zurück zum Zitat Maskani, I., Boutahar, J., El Houssaini, S.E.G.: Analysis of security requirements engineering: towards a comprehensive approach. Int. J. Adv. Comput. Sci. Appl. 7(11), 38–45 (2016) Maskani, I., Boutahar, J., El Houssaini, S.E.G.: Analysis of security requirements engineering: towards a comprehensive approach. Int. J. Adv. Comput. Sci. Appl. 7(11), 38–45 (2016)
4.
Zurück zum Zitat Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things. Cryptogr. Secur., 7 (2015) Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things. Cryptogr. Secur., 7 (2015)
5.
Zurück zum Zitat Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11–14 (2015)CrossRef Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11–14 (2015)CrossRef
6.
Zurück zum Zitat Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits and demerits. Int. J. Appl. Eng. Res. 11(1), 64–70 (2016) Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits and demerits. Int. J. Appl. Eng. Res. 11(1), 64–70 (2016)
7.
Zurück zum Zitat Ikram, N., Siddiqui, S., Khan, N.F.: Security requirement elicitation techniques : the comparison of misuse cases and issue based information systems, pp. 36–43 (2014) Ikram, N., Siddiqui, S., Khan, N.F.: Security requirement elicitation techniques : the comparison of misuse cases and issue based information systems, pp. 36–43 (2014)
8.
Zurück zum Zitat Oltsik, J.: The Internet of Things: a CISO and network security perspective. ESG White Paper, October 2014 Oltsik, J.: The Internet of Things: a CISO and network security perspective. ESG White Paper, October 2014
9.
Zurück zum Zitat Russell, B., Garlati, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). Mob. Work. Gr. Peer Rev. Doc., April 2015 Russell, B., Garlati, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). Mob. Work. Gr. Peer Rev. Doc., April 2015
10.
Zurück zum Zitat Borgia, E.: The Internet of Things Vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef Borgia, E.: The Internet of Things Vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef
11.
Zurück zum Zitat Zolanvari, M.: IoT security: a survey, pp. 1–15 (2010) Zolanvari, M.: IoT security: a survey, pp. 1–15 (2010)
12.
Zurück zum Zitat Patel, K.L., Patel, S.M.: Internet of Things-IOT : definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016) Patel, K.L., Patel, S.M.: Internet of Things-IOT : definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016)
13.
Zurück zum Zitat Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014) Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)
14.
Zurück zum Zitat Rahimi, S., Nguyen, T., Rahmani, A.M.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108–124 (2016)CrossRef Rahimi, S., Nguyen, T., Rahmani, A.M.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108–124 (2016)CrossRef
15.
Zurück zum Zitat Gope, P., Hwang, T.: BSN-Care: a secure IoT-Based modern healthcare using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)CrossRef Gope, P., Hwang, T.: BSN-Care: a secure IoT-Based modern healthcare using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)CrossRef
16.
Zurück zum Zitat Islam, S.M.R., Kwak, D., Kabir, H.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)CrossRef Islam, S.M.R., Kwak, D., Kabir, H.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)CrossRef
17.
Zurück zum Zitat Dhariwal, K., Mehta, A.: Architecture and plan of smart hospital based on Internet of Things (IOT). Int. Res. J. Eng. Technol. 4(4), 1976–1980 (2017) Dhariwal, K., Mehta, A.: Architecture and plan of smart hospital based on Internet of Things (IOT). Int. Res. J. Eng. Technol. 4(4), 1976–1980 (2017)
18.
Zurück zum Zitat Khanna, A., Anand, R.: IoT based smart parking system. In: International Conference on Internet of Things and Applications (IOTA), pp. 266–270 (2016) Khanna, A., Anand, R.: IoT based smart parking system. In: International Conference on Internet of Things and Applications (IOTA), pp. 266–270 (2016)
19.
Zurück zum Zitat Aravindan, V., James, D.: Smart homes using Internet of Things. Int. Res. J. Eng. Technol. 4(4), 1725–1729 (2017) Aravindan, V., James, D.: Smart homes using Internet of Things. Int. Res. J. Eng. Technol. 4(4), 1725–1729 (2017)
20.
Zurück zum Zitat Lau, H., Zhu, M., Ye, S.: An intelligent tracking system based on Internet of Things for the cold chain. Internet Res. 26(2), 435–445 (2016)CrossRef Lau, H., Zhu, M., Ye, S.: An intelligent tracking system based on Internet of Things for the cold chain. Internet Res. 26(2), 435–445 (2016)CrossRef
21.
Zurück zum Zitat Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lighweight security scheme for iot application using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372–392 (2014)CrossRef Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lighweight security scheme for iot application using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372–392 (2014)CrossRef
22.
Zurück zum Zitat Ibrahim, A.A., Kamalrudin, M., Abdollah, M.F.: Postgraduate research seminar 2017 (PGRS 2017). In: Proceeding of Postgraduate Research Seminar in Conjuction with ISORIS 2017, pp. 235–242, July 2017 Ibrahim, A.A., Kamalrudin, M., Abdollah, M.F.: Postgraduate research seminar 2017 (PGRS 2017). In: Proceeding of Postgraduate Research Seminar in Conjuction with ISORIS 2017, pp. 235–242, July 2017
23.
Zurück zum Zitat Kabir, A., Rahman, M.: A survey on security requirements elicitation and presentation in requirements engineering phase. Am. J. Eng. Res. 2(12), 360–366 (2014) Kabir, A., Rahman, M.: A survey on security requirements elicitation and presentation in requirements engineering phase. Am. J. Eng. Res. 2(12), 360–366 (2014)
24.
Zurück zum Zitat Beckers, K., Heisel, M., Côté, I., Goeke, L., Güler, S.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. 5(2), 24 (2014)CrossRef Beckers, K., Heisel, M., Côté, I., Goeke, L., Güler, S.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. 5(2), 24 (2014)CrossRef
25.
Zurück zum Zitat Islam, G., Qureshi, M.A.: A Framework for Security Requirements Elicitation (2012) Islam, G., Qureshi, M.A.: A Framework for Security Requirements Elicitation (2012)
26.
Zurück zum Zitat Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements (2011) Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements (2011)
27.
Zurück zum Zitat Kamalrudin, M., Hosking, J., Grundy, J.: MaramaAIC: tool support for consistency management and validation of requirements. Autom. Software Eng. 24(1), 1–45 (2016)CrossRef Kamalrudin, M., Hosking, J., Grundy, J.: MaramaAIC: tool support for consistency management and validation of requirements. Autom. Software Eng. 24(1), 1–45 (2016)CrossRef
28.
Zurück zum Zitat Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 564–567 (2011) Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 564–567 (2011)
29.
Zurück zum Zitat Yusop, N., Kamalrudin, M., Sidek, S.: Automated support to capture and validate security requirements for mobile apps. Requir. Eng. Towar. Sustain. World 671, 97–112 (2016)CrossRef Yusop, N., Kamalrudin, M., Sidek, S.: Automated support to capture and validate security requirements for mobile apps. Requir. Eng. Towar. Sustain. World 671, 97–112 (2016)CrossRef
Metadaten
Titel
A Security Requirements Library for the Development of Internet of Things (IoT) Applications
verfasst von
Massila Kamalrudin
Asma Asdayana Ibrahim
Safiah Sidek
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7796-8_7

Premium Partner