Skip to main content
Top

2018 | OriginalPaper | Chapter

A Security Requirements Library for the Development of Internet of Things (IoT) Applications

Authors : Massila Kamalrudin, Asma Asdayana Ibrahim, Safiah Sidek

Published in: Requirements Engineering for Internet of Things

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In today’s era, there is a rapid increase in the demand for IoT applications. Thus, securing the information content delivered among various entities involved in the IoT applications development has become an important issue. It is also identified that there is a high cost of implementing a secured IoT application as it requires efforts, skills and knowledge to understand the security concern, especially when developers and requirement engineers do not have any formal training in software engineering and eliciting security requirements. In addition, requirements engineers who are unfamiliar with the IoT applications confront problems to elicit accurate security requirements to avoid misinterpretations. Motivated by these issues, this paper presents the development of a new IoT security requirements library of security requirement for the development of IoT applications. Using an industry scenario, the utilities of the library demonstrated the elicitation of security requirements for each of the IoT attributes of specific business applications domains.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference GSM Association, IoT Security Guidelines Overview Document (2016) GSM Association, IoT Security Guidelines Overview Document (2016)
2.
go back to reference Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015) Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015)
3.
go back to reference Maskani, I., Boutahar, J., El Houssaini, S.E.G.: Analysis of security requirements engineering: towards a comprehensive approach. Int. J. Adv. Comput. Sci. Appl. 7(11), 38–45 (2016) Maskani, I., Boutahar, J., El Houssaini, S.E.G.: Analysis of security requirements engineering: towards a comprehensive approach. Int. J. Adv. Comput. Sci. Appl. 7(11), 38–45 (2016)
4.
go back to reference Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things. Cryptogr. Secur., 7 (2015) Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things. Cryptogr. Secur., 7 (2015)
5.
go back to reference Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11–14 (2015)CrossRef Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11–14 (2015)CrossRef
6.
go back to reference Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits and demerits. Int. J. Appl. Eng. Res. 11(1), 64–70 (2016) Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits and demerits. Int. J. Appl. Eng. Res. 11(1), 64–70 (2016)
7.
go back to reference Ikram, N., Siddiqui, S., Khan, N.F.: Security requirement elicitation techniques : the comparison of misuse cases and issue based information systems, pp. 36–43 (2014) Ikram, N., Siddiqui, S., Khan, N.F.: Security requirement elicitation techniques : the comparison of misuse cases and issue based information systems, pp. 36–43 (2014)
8.
go back to reference Oltsik, J.: The Internet of Things: a CISO and network security perspective. ESG White Paper, October 2014 Oltsik, J.: The Internet of Things: a CISO and network security perspective. ESG White Paper, October 2014
9.
go back to reference Russell, B., Garlati, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). Mob. Work. Gr. Peer Rev. Doc., April 2015 Russell, B., Garlati, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). Mob. Work. Gr. Peer Rev. Doc., April 2015
10.
go back to reference Borgia, E.: The Internet of Things Vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef Borgia, E.: The Internet of Things Vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef
11.
go back to reference Zolanvari, M.: IoT security: a survey, pp. 1–15 (2010) Zolanvari, M.: IoT security: a survey, pp. 1–15 (2010)
12.
go back to reference Patel, K.L., Patel, S.M.: Internet of Things-IOT : definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016) Patel, K.L., Patel, S.M.: Internet of Things-IOT : definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016)
13.
go back to reference Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014) Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)
14.
go back to reference Rahimi, S., Nguyen, T., Rahmani, A.M.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108–124 (2016)CrossRef Rahimi, S., Nguyen, T., Rahmani, A.M.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108–124 (2016)CrossRef
15.
go back to reference Gope, P., Hwang, T.: BSN-Care: a secure IoT-Based modern healthcare using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)CrossRef Gope, P., Hwang, T.: BSN-Care: a secure IoT-Based modern healthcare using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016)CrossRef
16.
go back to reference Islam, S.M.R., Kwak, D., Kabir, H.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)CrossRef Islam, S.M.R., Kwak, D., Kabir, H.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)CrossRef
17.
go back to reference Dhariwal, K., Mehta, A.: Architecture and plan of smart hospital based on Internet of Things (IOT). Int. Res. J. Eng. Technol. 4(4), 1976–1980 (2017) Dhariwal, K., Mehta, A.: Architecture and plan of smart hospital based on Internet of Things (IOT). Int. Res. J. Eng. Technol. 4(4), 1976–1980 (2017)
18.
go back to reference Khanna, A., Anand, R.: IoT based smart parking system. In: International Conference on Internet of Things and Applications (IOTA), pp. 266–270 (2016) Khanna, A., Anand, R.: IoT based smart parking system. In: International Conference on Internet of Things and Applications (IOTA), pp. 266–270 (2016)
19.
go back to reference Aravindan, V., James, D.: Smart homes using Internet of Things. Int. Res. J. Eng. Technol. 4(4), 1725–1729 (2017) Aravindan, V., James, D.: Smart homes using Internet of Things. Int. Res. J. Eng. Technol. 4(4), 1725–1729 (2017)
20.
go back to reference Lau, H., Zhu, M., Ye, S.: An intelligent tracking system based on Internet of Things for the cold chain. Internet Res. 26(2), 435–445 (2016)CrossRef Lau, H., Zhu, M., Ye, S.: An intelligent tracking system based on Internet of Things for the cold chain. Internet Res. 26(2), 435–445 (2016)CrossRef
21.
go back to reference Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lighweight security scheme for iot application using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372–392 (2014)CrossRef Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lighweight security scheme for iot application using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372–392 (2014)CrossRef
22.
go back to reference Ibrahim, A.A., Kamalrudin, M., Abdollah, M.F.: Postgraduate research seminar 2017 (PGRS 2017). In: Proceeding of Postgraduate Research Seminar in Conjuction with ISORIS 2017, pp. 235–242, July 2017 Ibrahim, A.A., Kamalrudin, M., Abdollah, M.F.: Postgraduate research seminar 2017 (PGRS 2017). In: Proceeding of Postgraduate Research Seminar in Conjuction with ISORIS 2017, pp. 235–242, July 2017
23.
go back to reference Kabir, A., Rahman, M.: A survey on security requirements elicitation and presentation in requirements engineering phase. Am. J. Eng. Res. 2(12), 360–366 (2014) Kabir, A., Rahman, M.: A survey on security requirements elicitation and presentation in requirements engineering phase. Am. J. Eng. Res. 2(12), 360–366 (2014)
24.
go back to reference Beckers, K., Heisel, M., Côté, I., Goeke, L., Güler, S.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. 5(2), 24 (2014)CrossRef Beckers, K., Heisel, M., Côté, I., Goeke, L., Güler, S.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. 5(2), 24 (2014)CrossRef
25.
go back to reference Islam, G., Qureshi, M.A.: A Framework for Security Requirements Elicitation (2012) Islam, G., Qureshi, M.A.: A Framework for Security Requirements Elicitation (2012)
26.
go back to reference Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements (2011) Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements (2011)
27.
go back to reference Kamalrudin, M., Hosking, J., Grundy, J.: MaramaAIC: tool support for consistency management and validation of requirements. Autom. Software Eng. 24(1), 1–45 (2016)CrossRef Kamalrudin, M., Hosking, J., Grundy, J.: MaramaAIC: tool support for consistency management and validation of requirements. Autom. Software Eng. 24(1), 1–45 (2016)CrossRef
28.
go back to reference Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 564–567 (2011) Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 564–567 (2011)
29.
go back to reference Yusop, N., Kamalrudin, M., Sidek, S.: Automated support to capture and validate security requirements for mobile apps. Requir. Eng. Towar. Sustain. World 671, 97–112 (2016)CrossRef Yusop, N., Kamalrudin, M., Sidek, S.: Automated support to capture and validate security requirements for mobile apps. Requir. Eng. Towar. Sustain. World 671, 97–112 (2016)CrossRef
Metadata
Title
A Security Requirements Library for the Development of Internet of Things (IoT) Applications
Authors
Massila Kamalrudin
Asma Asdayana Ibrahim
Safiah Sidek
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7796-8_7

Premium Partner