Skip to main content

Lego Methodology Approach for Common Criteria Certification of IoT Telemetry

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Abstract

In our days, almost every business relays on medium-to-high performance computer systems which presents the possibility of being the target of different threats that can exploit the vulnerable software, respectively hardware components. The concept of “security risk” can be described as a specific threat that using a specific type of attack presents the ability to exploit system vulnerabilities, action which will affect the entire integrity of the targeted systems. From this point of view, the main idea of this paper is to present a Lego methodology approach for Common Criteria certification that can be applied to IoT Telemetry systems. Furthermore, we present scenarios of implementation of our approach to increase robustness level applied for agro-telemetry system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)

    Article  Google Scholar 

  2. da Cruz, M.A., Rodrigues, J.J., Paradello, E.S., Lorenz, P., Solic, P., Albuquerque, V.H.C.: A proposal for bridging the message queuing telemetry transport protocol to HTTP on IoT solutions. In: 3rd International Conference on Smart and Sustainable Technologies (SpliTech), pp. 1–5. IEEE (2018)

    Google Scholar 

  3. ETSI France, Orange France: Internet of Things Global Standardisation-State of Play (2018)

    Google Scholar 

  4. Lesjak, C., Hein, D., Winter, J.: Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society, pp. 002589–002595. IEEE (2015)

    Google Scholar 

  5. Martin, B.A., Michaud, F., Banks, D., Mosenia, A., Zolfonoon, R., Irwan, S., Zao, J.K.: OpenFog security requirements and approaches. In: IEEE Fog World Congress (FWC), pp. 1–6. IEEE (2017)

    Google Scholar 

  6. Thomas, M.O., Rad, B.B.: Reliability evaluation metrics for internet of things, car tracking system: a review. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 9(2), 1–10 (2017)

    Google Scholar 

  7. Bialas, A.: Common criteria IT security evaluation methodology–an ontological approach. In: International Conference on Dependability and Complex Systems, pp. 23–34. Springer, Cham (2018)

    Google Scholar 

  8. Communications Security Establishment. https://www.cse-cst.gc.ca/en/canadian-common-criteria-scheme/main. Accessed 01 Oct 2018

  9. Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model, Version 3.1, Revision 4 (2012)

    Google Scholar 

  10. Common Criteria for IT security evaluation. https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_50en.pdf.pdf. Accessed 01 Oct 2018

  11. Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance components, Version 3.1, Revision 5 (2017)

    Google Scholar 

  12. Chae, H., Lee, D.H., Park, J., In, H.P.: The partitioning methodology in hardware/software co-design using extreme programming: evaluation through the lego robot project, pp. 187. IEEE (2006)

    Google Scholar 

  13. Suciu, G., Istrate, C., Petrache, A., Schlachet, D., Buteau, T.: On demand secure isolation using security models for different system management platforms. In: Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX, vol. 10977, p. 109770R (2019)

    Google Scholar 

Download references

Acknowledgements

This work has been supported in part by UEFISCDI Romania through projects ODSI, ToR-SIM and PARFAIT, funded in part by European Union’s Horizon 2020 research and innovation program under grant agreement No. 777996 (SealedGRID project) and No. 787002 (SAFECARE project).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Suciu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suciu, G., Istrate, C., Petre, I., Scheianu, A. (2019). Lego Methodology Approach for Common Criteria Certification of IoT Telemetry. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_17

Download citation

Publish with us

Policies and ethics