Abstract
In our days, almost every business relays on medium-to-high performance computer systems which presents the possibility of being the target of different threats that can exploit the vulnerable software, respectively hardware components. The concept of “security risk” can be described as a specific threat that using a specific type of attack presents the ability to exploit system vulnerabilities, action which will affect the entire integrity of the targeted systems. From this point of view, the main idea of this paper is to present a Lego methodology approach for Common Criteria certification that can be applied to IoT Telemetry systems. Furthermore, we present scenarios of implementation of our approach to increase robustness level applied for agro-telemetry system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)
da Cruz, M.A., Rodrigues, J.J., Paradello, E.S., Lorenz, P., Solic, P., Albuquerque, V.H.C.: A proposal for bridging the message queuing telemetry transport protocol to HTTP on IoT solutions. In: 3rd International Conference on Smart and Sustainable Technologies (SpliTech), pp. 1–5. IEEE (2018)
ETSI France, Orange France: Internet of Things Global Standardisation-State of Play (2018)
Lesjak, C., Hein, D., Winter, J.: Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society, pp. 002589–002595. IEEE (2015)
Martin, B.A., Michaud, F., Banks, D., Mosenia, A., Zolfonoon, R., Irwan, S., Zao, J.K.: OpenFog security requirements and approaches. In: IEEE Fog World Congress (FWC), pp. 1–6. IEEE (2017)
Thomas, M.O., Rad, B.B.: Reliability evaluation metrics for internet of things, car tracking system: a review. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 9(2), 1–10 (2017)
Bialas, A.: Common criteria IT security evaluation methodology–an ontological approach. In: International Conference on Dependability and Complex Systems, pp. 23–34. Springer, Cham (2018)
Communications Security Establishment. https://www.cse-cst.gc.ca/en/canadian-common-criteria-scheme/main. Accessed 01 Oct 2018
Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model, Version 3.1, Revision 4 (2012)
Common Criteria for IT security evaluation. https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_50en.pdf.pdf. Accessed 01 Oct 2018
Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance components, Version 3.1, Revision 5 (2017)
Chae, H., Lee, D.H., Park, J., In, H.P.: The partitioning methodology in hardware/software co-design using extreme programming: evaluation through the lego robot project, pp. 187. IEEE (2006)
Suciu, G., Istrate, C., Petrache, A., Schlachet, D., Buteau, T.: On demand secure isolation using security models for different system management platforms. In: Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX, vol. 10977, p. 109770R (2019)
Acknowledgements
This work has been supported in part by UEFISCDI Romania through projects ODSI, ToR-SIM and PARFAIT, funded in part by European Union’s Horizon 2020 research and innovation program under grant agreement No. 777996 (SealedGRID project) and No. 787002 (SAFECARE project).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Suciu, G., Istrate, C., Petre, I., Scheianu, A. (2019). Lego Methodology Approach for Common Criteria Certification of IoT Telemetry. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-16184-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16183-5
Online ISBN: 978-3-030-16184-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)