Skip to main content

2018 | OriginalPaper | Buchkapitel

Towards Model-Based Communication Control for the Internet of Things

verfasst von : Imad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi

Erschienen in: Software Technologies: Applications and Foundations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of existing Model-Driven Engineering (MDE) approaches for the Internet of Things (IoT) focus on means of modeling the behavior of end devices. Little attention has been paid to network-related abstractions and communication control. The paper introduces an approach towards enabling model-based communication control in a network of things. First, we suggest a Domain Specific Language (DSL) to abstract basic network features. Second, we propose a policy language to control the communications within the network. Finally, as a proof-of-concept, we present a code generation process to enforce the expressed policy at runtime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16–25. IEEE (2017) Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16–25. IEEE (2017)
2.
Zurück zum Zitat Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1–10(2011) Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1–10(2011)
3.
Zurück zum Zitat Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)CrossRef Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)CrossRef
4.
Zurück zum Zitat OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013) OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013)
5.
Zurück zum Zitat Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995) Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995)
6.
Zurück zum Zitat Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004) Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004)
7.
Zurück zum Zitat Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402–406. IEEE (2004) Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402–406. IEEE (2004)
8.
Zurück zum Zitat Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptions Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptions
9.
Zurück zum Zitat UK Egham: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017) UK Egham: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017)
10.
Zurück zum Zitat Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110–126 (2015)CrossRef Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110–126 (2015)CrossRef
11.
Zurück zum Zitat Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125–135 (2016) Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125–135 (2016)
12.
Zurück zum Zitat Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85–88 (2015)CrossRef Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85–88 (2015)CrossRef
13.
Zurück zum Zitat Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef
14.
Zurück zum Zitat Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017) Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017)
15.
Zurück zum Zitat Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015) Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015)
16.
Zurück zum Zitat Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Schätz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52–68. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41533-3_4CrossRef Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Schätz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52–68. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-41533-3_​4CrossRef
17.
Zurück zum Zitat Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395–400. IEEE (2017) Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395–400. IEEE (2017)
18.
Zurück zum Zitat Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30–36 (2017)CrossRef Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30–36 (2017)CrossRef
19.
Zurück zum Zitat Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003) Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003)
20.
Zurück zum Zitat Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1–22 (2014) Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1–22 (2014)
21.
Zurück zum Zitat Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish/subscribe systems. JNW 2(2), 57–67 (2007)CrossRef Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish/subscribe systems. JNW 2(2), 57–67 (2007)CrossRef
22.
Zurück zum Zitat Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015) Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015)
23.
Zurück zum Zitat Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172–177. IEEE (2018) Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172–177. IEEE (2018)
25.
Zurück zum Zitat Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017) Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017)
26.
Zurück zum Zitat Vasilevskiy, A., Morin, B., Haugen, Ø., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016) Vasilevskiy, A., Morin, B., Haugen, Ø., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016)
27.
Zurück zum Zitat Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016) Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016)
Metadaten
Titel
Towards Model-Based Communication Control for the Internet of Things
verfasst von
Imad Berrouyne
Mehdi Adda
Jean-Marie Mottu
Jean-Claude Royer
Massimo Tisi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-04771-9_49