Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

A Comparative Study for Modeling IoT Security Systems

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Networks and Systems ((LNNS,volume 717))

  • 424Accesses

  • 2Citations

Abstract

This contribution addresses the need of modeling the security of IoT (Internet of Things) systems. Therefore, modeling such complex system is a challenging task due to their heterogeneity with its different components and also the resources limitations. For this reason, this paper aims at modeling the security in the physical and network layers. Moreover, for IoT systems, there is no standardization for representative language. Among the questions asked in this research: which is the effective and the more suitable language for IoT security modeling? In this work, we will discuss the UML and SysML modeling languages, the related works of each language. Hence, the SysML and UML are one of the visual modeling resources that are making possible the usage of extensions for modeling such complex system. SysML is widely used for Embedded Systems, it can also be used as modeling language for IoT security. In this contribution, we have chosen to discuss SysML modeling language. The main aim is to study the security aspect in modeling IoT systems. This work addresses a new proposed modeling and designing IoT security systems. Through this paper, we use two languages for modeling IoT security systems through two diagrams (use case and requirements diagrams). To evaluate the proposed modelisation, we provided a comparison between UML and SysML by modeling the security of the first two layers of the IoT architecture.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 32031
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 40039
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

References

  1. https://uml.developpez.com/cours/Modelisation-SysML/. Accessed 2022/04/05

  2. Robles-Ramirez, D.A., Escamilla-Ambrosio, P.J., Tryfonas, T.: IoTsec: UML extension for Internet of things systems security modeling. In: 2017 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE), pp. 151–156. IEEE (2017)

    Google Scholar 

  3. Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014)

    Google Scholar 

  4. Belloir, N., Bruel, J.M., Hoang, N., Pham, C.: Utilisation de SysML pour la modélisation des réseaux de capteurs. In: LMO, pp. 169–184 (2008)

    Google Scholar 

  5. Geller, M., & meneses, A.A.: Modeling IoT Systems with UML: A Case Study for Monitoring and Predicting Power Consumption (2021)

    Google Scholar 

  6. Thramboulidis, F.: Christoulakis, UML4IoT—A UML-based approach to exploit IoT in cyber physical manufacturing systems. Comput. Ind.82, 259–272 (2016)

    Article  Google Scholar 

  7. Reggio, G.: A UML-based proposal for IoT system requirements specification. In: Proceedings of the 10th International Workshop on Modeling in Software Engineering, pp. 9–16 (2018)

    Google Scholar 

  8. Costa, B., Pires, P.F., Delicato, F.C., Li, W., Zomaya, A.Y.: Design and Analysis of IoT Applications: A Model-Driven Approach, in IEEE 14th Intl Conf on Dependable, pp. 392–399. Autonomic and Secure Computing, Auckland (2016)

    Google Scholar 

  9. Hind, M., Noura, O., Amine, K. M., and Sanae, M. Internet of Things: Classification of attacks using CTM method. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1–5 (2020)

    Google Scholar 

  10. Meziane, H., Ouerdi, N., Kasmi, M.A., Mazouz, S.: Classifying security attacks in IoT using CTM method. In: Ben Ahmed, M., Mellouli, S., Braganca, L., Anouar Abdelhakim, B., Bernadetta, K.A. (eds.) Emerging Trends in ICT for Sustainable Development. ASTI, pp. 307–315. Springer, Cham (2021).https://doi.org/10.1007/978-3-030-53440-0_32

    Chapter  Google Scholar 

  11. Meziane, H., Ouerdi, N.: A Study of Modelling IoT Security Systems with Unified Modelling Language (UML). Int. J. Adv. Comput. Sci. Appl. (IJACSA)13(11) (2022)

    Google Scholar 

  12. Jha, D.N., et al.: IoTSim‐Edge: a simulation framework for modeling the behavior of Internet of Things and edge computing environments. Software: Practice and Experience50(6), pp. 844–867 (2020)

    Google Scholar 

  13. Akram, H., Konstantas, D., Mahyoub, M.: A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. Int. J. Adv. Comput. Sci. Appl. (IJACSA)9(3) (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. ACSA Laboratory, Faculty of Sciences, Mohammed First University, Oujda, Morocco

    Meziane Hind & Ouerdi Noura

  2. SmartICT Laboratory, Faculty of Sciences, Mohammed First University, Oujda, Morocco

    Mazouz Sanae

  3. Machine Intelligence Research Labs (MIR Labs), Scientific Network for Innovation and Research Excellence, Auburn, WA, 98071, USA

    Ajith Abraham

Authors
  1. Meziane Hind
  2. Ouerdi Noura
  3. Mazouz Sanae
  4. Ajith Abraham

Corresponding author

Correspondence toMeziane Hind.

Editor information

Editors and Affiliations

  1. Faculty of Computing and Data Science, FLAME University, Pune, Maharashtra, India

    Ajith Abraham

  2. Center for Smart Computing Continuum, Burgenland, Austria

    Sabri Pllana

  3. University of Bari, Bari, Italy

    Gabriella Casalino

  4. University of Jinan, Jinan, Shandong, China

    Kun Ma

  5. Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India

    Anu Bajaj

Rights and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hind, M., Noura, O., Sanae, M., Abraham, A. (2023). A Comparative Study for Modeling IoT Security Systems. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 717. Springer, Cham. https://doi.org/10.1007/978-3-031-35510-3_25

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 32031
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 40039
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp