IoTsecM: A UML/SysML Extension for Internet of Things Security Modeling

Ponciano J Escamilla-Ambrosio, David Robles-Ramirez, Theo Tryfonas, Abraham Rodriguez-Mota, Gina Gallegos-García, Moises Salinas-Rosales

Research output: Contribution to journalArticle (Academic Journal)peer-review

4 Citations (Scopus)
413 Downloads (Pure)

Abstract

In this paper, an approach referred to as IoTsecM is proposed. This proposal is a UML/SysML extension for security requirements modeling within the analysis stage in a waterfall development life cycle in a Model-Based Systems Engineering Approach. IoTsecM allows the security requirements representation in two very well-known modeling languages, UML and SysML. With the utilization of this extension, IoT developers can consider the security requirements from the analysis stage in the design process of IoT systems. IoTsecM allows IoT systems to be designed considering possible threats and the corresponding security requirements analysis. The applicability of IoTsecM is demonstrated through applying it to analyze and represent the security requirements in an IoT real-life system in the context of collaborative autonomous vehicles in smart cities. In this use case, IoTsecM was able to represent the security requirements identified within the system architecture elements, in which all countermeasures identified were depicted using the proposed IoTsecM profile.
Original languageEnglish
Pages (from-to)154112-154135
Number of pages24
JournalIEEE Access
Volume9
Early online date13 Nov 2021
DOIs
Publication statusPublished - 2021

Bibliographical note

Funding Information:
This work was supported in part by the Consejo Nacional de Ciencia y Tecnolog?a (CONACY), and in part by the Instituto Polit?cnico Nacional under Grant SIP 1999 and Grant 20210039. The work of Theo Tryfonas was supported by the Department for Business, Energy and Industrial Strategy, U.K.

Publisher Copyright:
© 2013 IEEE.

Fingerprint

Dive into the research topics of 'IoTsecM: A UML/SysML Extension for Internet of Things Security Modeling'. Together they form a unique fingerprint.

Cite this