Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing

06/25/2019
by   Ralph Ankele, et al.
0

The factories of the future require efficient interconnection of their physical machines into the cyber space to cope with the emerging need of an increased uptime of machines, higher performance rates, an improved level of productivity and a collective collaboration along the supply chain. With the rapid growth of the Internet of Things (IoT), and its application in industrial areas, the so called Industrial Internet of Things (IIoT)/Industry 4.0 emerged. However, further to the rapid growth of IoT/IIoT systems, cyber attacks are an emerging threat and simple manual security testing can often not cope with the scale of large IoT/IIoT networks. In this paper, we suggest to extract metadata from commonly used diagrams and models in a typical software development process, to automate the process of threat modelling, security analysis and penetration testing, without detailed prior security knowledge. In that context, we present requirements and recommendations for metadata in IoT/IIoT models that are needed as necessary input parameters of security assurance tools.

READ FULL TEXT
research
11/15/2019

Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing

Industrial Internet of Things (IIoT) application provide a whole new set...
research
10/22/2019

Designing Security and Privacy Requirements in Internet of Things: A Survey

The design and development process for the Internet of Things (IoT) appl...
research
08/11/2020

Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things

Journalists have long been the targets of both physical and cyber-attack...
research
01/24/2022

STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems

The concept of traditional farming is changing rapidly with the introduc...
research
01/22/2018

Avoiding the Internet of Insecure Industrial Things

Security incidents such as targeted distributed denial of service (DDoS)...
research
05/08/2022

Reasoning about inter-procedural security requirements in IoT applications

The importance of information security dramatically increased and will f...

Please sign up or login with your details

Forgot password? Click here to reset