Skip to main content
Top

2018 | OriginalPaper | Chapter

Towards Model-Based Communication Control for the Internet of Things

Authors : Imad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi

Published in: Software Technologies: Applications and Foundations

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of existing Model-Driven Engineering (MDE) approaches for the Internet of Things (IoT) focus on means of modeling the behavior of end devices. Little attention has been paid to network-related abstractions and communication control. The paper introduces an approach towards enabling model-based communication control in a network of things. First, we suggest a Domain Specific Language (DSL) to abstract basic network features. Second, we propose a policy language to control the communications within the network. Finally, as a proof-of-concept, we present a code generation process to enforce the expressed policy at runtime.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16–25. IEEE (2017) Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16–25. IEEE (2017)
2.
go back to reference Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1–10(2011) Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1–10(2011)
3.
go back to reference Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)CrossRef Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)CrossRef
4.
go back to reference OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013) OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013)
5.
go back to reference Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995) Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995)
6.
go back to reference Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004) Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004)
7.
go back to reference Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402–406. IEEE (2004) Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402–406. IEEE (2004)
8.
go back to reference Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptions Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptions
9.
go back to reference UK Egham: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017) UK Egham: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017)
10.
go back to reference Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110–126 (2015)CrossRef Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110–126 (2015)CrossRef
11.
go back to reference Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125–135 (2016) Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125–135 (2016)
12.
go back to reference Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85–88 (2015)CrossRef Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85–88 (2015)CrossRef
13.
go back to reference Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef
14.
go back to reference Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017) Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017)
15.
go back to reference Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015) Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015)
16.
go back to reference Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Schätz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52–68. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41533-3_4CrossRef Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Schätz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52–68. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-41533-3_​4CrossRef
17.
go back to reference Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395–400. IEEE (2017) Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395–400. IEEE (2017)
18.
go back to reference Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30–36 (2017)CrossRef Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30–36 (2017)CrossRef
19.
go back to reference Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003) Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003)
20.
go back to reference Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1–22 (2014) Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1–22 (2014)
21.
go back to reference Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish/subscribe systems. JNW 2(2), 57–67 (2007)CrossRef Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish/subscribe systems. JNW 2(2), 57–67 (2007)CrossRef
22.
go back to reference Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015) Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015)
23.
go back to reference Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172–177. IEEE (2018) Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172–177. IEEE (2018)
25.
go back to reference Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017) Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017)
26.
go back to reference Vasilevskiy, A., Morin, B., Haugen, Ø., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016) Vasilevskiy, A., Morin, B., Haugen, Ø., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016)
27.
go back to reference Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016) Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016)
Metadata
Title
Towards Model-Based Communication Control for the Internet of Things
Authors
Imad Berrouyne
Mehdi Adda
Jean-Marie Mottu
Jean-Claude Royer
Massimo Tisi
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-04771-9_49

Premium Partner