Integrating security mechanisms into embedded systems by domain-specific modelling

被引:7
作者
Vasilevskaya, Maria [1 ]
Gunawan, Linda Ariani [2 ]
Nadjm-Tehrani, Simin [1 ]
Herrmann, Peter [2 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, S-58183 Linkoping, Sweden
[2] Norwegian Univ Sci & Technol NTNU, Dept Telemat, Trondheim, Norway
关键词
model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering;
D O I
10.1002/sec.819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices are crucial enablers of the Internet of Things and become increasingly common in our daily life. They store, manipulate and transmit sensitive information and, therefore, must be protected against security threats. Due to the security and also resource constraint concerns, designing secure networked embedded systems is a difficult task. Model-based development (MBD) is promoted to address complexity and ease the design of software intensive systems. We leverage MBD and domain-specific modelling to characterise common issues related to security and embedded systems that are specific to a given application domain. Security-specific knowledge relevant for a certain application domain is represented in the form of an adapted information security ontology. Further, the elements of the ontology are associated with security building blocks modelled with the MBD method SPACE. The selection of relevant security building blocks is based on (i) assets automatically elicited from the functional models, (ii) domain security knowledge captured by the security expert and (iii) the platform adopted by the embedded system engineer. A tool is developed to support the steps supporting this methodology and help to bridge between the security and embedded systems domains. We illustrate our approach with a case study from the smart metering domain.Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:2815 / 2832
页数:18
相关论文
共 40 条
  • [1] [Anonymous], 122072008 ISOIEC
  • [2] Bendix L., 2008, Proceedings of the 2008 International Workshop on Comparison and Versioning of Software Models, P31, DOI DOI 10.1145/1370152.1370161
  • [3] Braber F, 2007, MODEL BASED SECURITY
  • [4] What are ontologies, and why do we need them?
    Chandrasekaran, B
    Josephson, JR
    Benjamins, VR
    [J]. IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (01): : 20 - 26
  • [5] Clements P., 2001, SOFTWARE PRODUCT LIN
  • [6] Cormen T., 2001, Introduction to Algorithms
  • [7] Eby M, 2007, ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, P221
  • [8] Fenz S., 2009, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, P183
  • [9] Gasevic D., 2009, Model Driven Engineering and Ontology Development
  • [10] Georg G, 2009, ASPECT ORIENTED METH