Part of the book series:Lecture Notes in Networks and Systems ((LNNS,volume 717))
Included in the following conference series:
424Accesses
2Citations
Abstract
This contribution addresses the need of modeling the security of IoT (Internet of Things) systems. Therefore, modeling such complex system is a challenging task due to their heterogeneity with its different components and also the resources limitations. For this reason, this paper aims at modeling the security in the physical and network layers. Moreover, for IoT systems, there is no standardization for representative language. Among the questions asked in this research: which is the effective and the more suitable language for IoT security modeling? In this work, we will discuss the UML and SysML modeling languages, the related works of each language. Hence, the SysML and UML are one of the visual modeling resources that are making possible the usage of extensions for modeling such complex system. SysML is widely used for Embedded Systems, it can also be used as modeling language for IoT security. In this contribution, we have chosen to discuss SysML modeling language. The main aim is to study the security aspect in modeling IoT systems. This work addresses a new proposed modeling and designing IoT security systems. Through this paper, we use two languages for modeling IoT security systems through two diagrams (use case and requirements diagrams). To evaluate the proposed modelisation, we provided a comparison between UML and SysML by modeling the security of the first two layers of the IoT architecture.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 32031
- Price includes VAT (Japan)
- Softcover Book
- JPY 40039
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://uml.developpez.com/cours/Modelisation-SysML/. Accessed 2022/04/05
Robles-Ramirez, D.A., Escamilla-Ambrosio, P.J., Tryfonas, T.: IoTsec: UML extension for Internet of things systems security modeling. In: 2017 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE), pp. 151–156. IEEE (2017)
Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014)
Belloir, N., Bruel, J.M., Hoang, N., Pham, C.: Utilisation de SysML pour la modélisation des réseaux de capteurs. In: LMO, pp. 169–184 (2008)
Geller, M., & meneses, A.A.: Modeling IoT Systems with UML: A Case Study for Monitoring and Predicting Power Consumption (2021)
Thramboulidis, F.: Christoulakis, UML4IoT—A UML-based approach to exploit IoT in cyber physical manufacturing systems. Comput. Ind.82, 259–272 (2016)
Reggio, G.: A UML-based proposal for IoT system requirements specification. In: Proceedings of the 10th International Workshop on Modeling in Software Engineering, pp. 9–16 (2018)
Costa, B., Pires, P.F., Delicato, F.C., Li, W., Zomaya, A.Y.: Design and Analysis of IoT Applications: A Model-Driven Approach, in IEEE 14th Intl Conf on Dependable, pp. 392–399. Autonomic and Secure Computing, Auckland (2016)
Hind, M., Noura, O., Amine, K. M., and Sanae, M. Internet of Things: Classification of attacks using CTM method. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1–5 (2020)
Meziane, H., Ouerdi, N., Kasmi, M.A., Mazouz, S.: Classifying security attacks in IoT using CTM method. In: Ben Ahmed, M., Mellouli, S., Braganca, L., Anouar Abdelhakim, B., Bernadetta, K.A. (eds.) Emerging Trends in ICT for Sustainable Development. ASTI, pp. 307–315. Springer, Cham (2021).https://doi.org/10.1007/978-3-030-53440-0_32
Meziane, H., Ouerdi, N.: A Study of Modelling IoT Security Systems with Unified Modelling Language (UML). Int. J. Adv. Comput. Sci. Appl. (IJACSA)13(11) (2022)
Jha, D.N., et al.: IoTSim‐Edge: a simulation framework for modeling the behavior of Internet of Things and edge computing environments. Software: Practice and Experience50(6), pp. 844–867 (2020)
Akram, H., Konstantas, D., Mahyoub, M.: A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. Int. J. Adv. Comput. Sci. Appl. (IJACSA)9(3) (2018)
Author information
Authors and Affiliations
ACSA Laboratory, Faculty of Sciences, Mohammed First University, Oujda, Morocco
Meziane Hind & Ouerdi Noura
SmartICT Laboratory, Faculty of Sciences, Mohammed First University, Oujda, Morocco
Mazouz Sanae
Machine Intelligence Research Labs (MIR Labs), Scientific Network for Innovation and Research Excellence, Auburn, WA, 98071, USA
Ajith Abraham
- Meziane Hind
Search author on:PubMed Google Scholar
- Ouerdi Noura
Search author on:PubMed Google Scholar
- Mazouz Sanae
Search author on:PubMed Google Scholar
- Ajith Abraham
Search author on:PubMed Google Scholar
Corresponding author
Correspondence toMeziane Hind.
Editor information
Editors and Affiliations
Faculty of Computing and Data Science, FLAME University, Pune, Maharashtra, India
Ajith Abraham
Center for Smart Computing Continuum, Burgenland, Austria
Sabri Pllana
University of Bari, Bari, Italy
Gabriella Casalino
University of Jinan, Jinan, Shandong, China
Kun Ma
Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Anu Bajaj
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hind, M., Noura, O., Sanae, M., Abraham, A. (2023). A Comparative Study for Modeling IoT Security Systems. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 717. Springer, Cham. https://doi.org/10.1007/978-3-031-35510-3_25
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-031-35509-7
Online ISBN:978-3-031-35510-3
eBook Packages:Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative