Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

被引:7
作者
Liao, Zitian [1 ]
Nazir, Shah [2 ]
Khan, Habib Ullah [3 ]
Shafiq, Muhammad [4 ]
机构
[1] Univ Sydney, Sch Architecture Design & Planning, Sydney, NSW 2006, Australia
[2] Univ Swabi, Dept Comp Sci, Swabi, Khyber Pakhtunk, Pakistan
[3] Qatar Univ, Coll Business & Econ, Dept Accounting & Informat Syst, Doha, Qatar
[4] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
关键词
NETWORK SECURITY; RISK-ASSESSMENT; FRAMEWORK; IOT; VULNERABILITY; MANAGEMENT; KNOWLEDGE; PRIVACY; SERVICE; METRICS;
D O I
10.1155/2021/6677867
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The use of such components in a newly developed software system can save effort, time, and many resources. Due to the practice of using components for new developments, security is one of the major concerns for researchers to tackle. Security of software components can save the software from the harm of illegal access and damages of its contents. Several existing approaches are available to solve the issues of security of components from different perspectives in general while security evaluation is specific. A detailed report of the existing approaches and techniques used for security purposes is needed for the researchers to know about the approaches. In order to tackle this issue, the current research presents a systematic literature review (SLR) of the present approaches used for assessing the security of software components in the literature by practitioners to protect software systems for the Internet of Things (IoT). The study searches the literature in the popular and well-known libraries, filters the relevant literature, organizes the filter papers, and extracts derivations from the selected studies based on different perspectives. The proposed study will benefit practitioners and researchers in support of the report and devise novel algorithms, techniques, and solutions for effective evaluation of the security of software components.
引用
收藏
页数:22
相关论文
共 146 条
[1]  
Abadi M., P INT S FORM METH PA, P1
[2]  
Adnan Rawashdeh., 2006, J COMPUTER SCI, V2, P373, DOI DOI 10.3844/JCSSP.2006.373.381
[3]   StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications [J].
Ahmad, Maqsood ;
Costamagna, Valerio ;
Crispo, Bruno ;
Bergadano, Francesco ;
Zhauniarovich, Yury .
JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 159
[4]   Objective Risk Evaluation for Automated Security Management [J].
Ahmed, Mohammad Salim ;
Al-Shaer, Ehab ;
Taibah, Mohamed ;
Khan, Latifur .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (03) :343-366
[5]   Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce [J].
Al-Jaljouli, Raja ;
Abawajy, Jemal ;
Hassan, Mohammad Mehedi ;
Alelaiwi, Abdulhameed .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) :415-429
[6]   Interoperability of Security-Enabled Internet of Things [J].
Alam, Sarfraz ;
Chowdhury, Mohammad M. R. ;
Noll, Josef .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :567-586
[7]  
AlBreiki HH, 2014, IEEE INT CONF INNOV, P93, DOI 10.1109/INNOVATIONS.2014.6987569
[8]  
Alebrahim A, 2014, LECT NOTES COMPUT SC, V8708, P45, DOI 10.1007/978-3-319-10975-6_4
[9]   Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS [J].
Allodi, Luca ;
Banescu, Sebastian ;
Femmer, Henning ;
Beckers, Kristian .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :119-126
[10]   Mean privacy: A metric for security of computer systems [J].
Almasizadeh, Jaafar ;
Azgomi, Mohammad Abdollahi .
COMPUTER COMMUNICATIONS, 2014, 52 :47-59