Toward the automation of threat modeling and risk assessment in IoT systems

被引:50
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Rak, Massimiliano [2 ]
Villano, Umberto [3 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Via Claudio 21, I-80125 Naples, Italy
[2] Univ Campania Luigi Vanvitelli, Dept Comp Engn, Via Roma 29, I-81031 Aversa, Italy
[3] Univ Sannio, Dept Engn, Via Traiano 3, I-82100 Benevento, Italy
关键词
IoT automated threat modeling; IoT automated risk assessment; IoT secure design;
D O I
10.1016/j.iot.2019.100056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has recently become one of the most relevant emerging technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of involved architectural components (e.g., device platforms, services, networks, architectures) and involve a multiplicity of application domains. In the IoT scenario, the identification of specific security requirements and the security design are very complex and expensive tasks, since they heavily depend on the configuration deployment actually in place and require security experts. In order to overcome these issues, we propose an approach aimed at supporting the security analysis of an IoT system by means of an almost completely automated process for threat modeling and risk assessment, which also helps identify the security controls to implement in order to mitigate existing security risks. We demonstrate the effectiveness of the approach by discussing its application to a home automation system, built on top of commercial IoT products. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 31 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   The Internet of Things vision: Key features, applications and open issues [J].
Borgia, Eleonora .
COMPUTER COMMUNICATIONS, 2014, 54 :1-31
[3]  
Casola Valentina, 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P24, DOI 10.1109/WETICE.2018.00012
[4]   Security-by-design in multi-cloud applications: An optimization approach [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano ;
Villano, Umberto .
INFORMATION SCIENCES, 2018, 454 :344-362
[5]   Internet of things reference architectures, security and interoperability: A survey [J].
Di Martino, B. ;
Rak, M. ;
Ficco, M. ;
Esposito, A. ;
Maisto, S. A. ;
Nacchia, S. .
INTERNET OF THINGS, 2018, 1-2 :99-112
[6]  
Gartner I, 2017, FORECAST INTERNET TH
[7]  
Hodo E, 2016, 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC)
[8]  
IEEE Draft Standard for an Architectural Framework for the Internet of Things (IoT), 2015, P2413 IEEE
[9]  
Internet of Things Reference Architecture (IoT RA), 2016, 3014120160910E ISO I
[10]  
Kasinathan P, 2013, IEEE CONF WIREL MOB, P600, DOI 10.1109/WiMOB.2013.6673419