Model-based security testing in IoT systems: A Rapid Review

被引:8
作者
Lonetti, Francesca [1 ]
Bertolino, Antonia [1 ]
Di Giandomenico, Felicita [1 ]
机构
[1] CNR, Ist Sci & Tecnol Informaz, Via G Moruzzi 1, I-56124 Pisa, Italy
关键词
Internet of Things; Model-based testing; Security testing; INTERNET; TAXONOMY; ATTACKS;
D O I
10.1016/j.infsof.2023.107326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The heterogeneous devices expose different vulnerabilities that can influence the methods and cost of security testing. Model based security testing techniques support the systematic generation of test cases for the assessment of security requirements by leveraging the specifications of the IoT system model and of the attack templates.Objective: This paper aims to review the adoption of model-based security testing in the context of IoT, and then provides the first systematic and up-to-date comprehensive classification and analysis of research studies in this topic.Method: We conducted a systematic literature review analyzing 803 publications and finally selecting 17 primary studies, which satisfied our inclusion criteria and were classified according to a set of relevant analysis dimensions.Results: We report the state-of-the-art about the used formalisms, the test techniques, the objectives, the target applications and domains; we also identify the targeted security attacks, and discuss the challenges, gaps and future research directions.Conclusion: Our review represents the first attempt to systematically analyze and classify existing studies on model-based security testing for IoT. According to the results, model-based security testing has been applied in core IoT domains. Models complexity and the need of modeling evolving scenarios that include heterogeneous open software and hardware components remain the most important shortcomings. Our study shows that model-based security testing of IoT applications is a promising research direction. The principal future research directions deal with: extending the existing modeling formalisms in order to capture all peculiarities and constraints of complex and large scale IoT networks; the definition of context-aware and dynamic evolution modeling approaches of IoT entities; and the combination of model-based testing techniques with other security test strategies such as penetration testing or learning techniques for model inference.
引用
收藏
页数:16
相关论文
共 91 条
[1]   Model-Based Testing for Internet of Things Systems [J].
Ahmad, Abbas ;
Bouquet, Fabrice ;
Fourneret, Elizabeta ;
Legeard, Bruno .
ADVANCES IN COMPUTERS, VOL 108, 2018, 108 :1-58
[2]   Model-Based Testing as a Service for IoT Platforms [J].
Ahmad, Abbas ;
Bouquet, Fabrice ;
Fourneret, Elizabeta ;
Le Gall, Franck ;
Legeard, Bruno .
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 :727-742
[3]   Model-Based System Engineering of the Internet of Things: A Bibliometric Literature Analysis [J].
Ahmad, Ehsan .
IEEE ACCESS, 2023, 11 :50642-50658
[4]   Learning-Based Fuzzing of IoT Message Brokers [J].
Aichernig, Bernhard K. ;
Muskardin, Edi ;
Pferscher, Andrea .
2021 14TH IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2021), 2021, :47-58
[5]   IoTsec: UML extension for Internet of things systems security modelling [J].
Alejandro Robles-Ramirez, David ;
Jorge Escamilla-Ambrosio, Ponciano ;
Tryfonas, Theo .
2017 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONICS AND AUTOMOTIVE ENGINEERING (ICMEAE), 2017, :151-156
[6]  
Allweyer T, 2016, BPMN 2.0: introduction to the standard for business process modeling
[7]   IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges [J].
Anand, Pooja ;
Singh, Yashwant ;
Selwal, Arvind ;
Alazab, Mamoun ;
Tanwar, Sudeep ;
Kumar, Neeraj .
IEEE ACCESS, 2020, 8 (168825-168853) :168825-168853
[8]  
Anwer F., 2017, Trends in Software Testing, P35, DOI 10.1007/978-981-10-1415-4_3
[9]   Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice [J].
Arcile, Johan ;
Andre, Etienne .
ACM COMPUTING SURVEYS, 2023, 55 (06)
[10]   A Survey on Authentication Techniques for the Internet of Things [J].
Atwady, Yahya ;
Hammoudeh, Mohammad .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,