TY - JOUR
T1 - The design of secure IoT applications using patterns
T2 - State of the art and directions for research
AU - Fernandez, Eduardo B.
AU - Washizaki, Hironori
AU - Yoshioka, Nobukazu
AU - Okubo, Takao
N1 - Funding Information:
This article was started during the visit of the first author to Tokyo in March of 2019 by invitation of the National Institute of Informatics (NII) of Japan. Prof. Hernan Astudillo of the Universidad Tecnica Federico Santa Maria, Chile, and my student Anelis Pereira-Vale (Chile) made valuable suggestions. Three of my PhD students in FAU are working on aspects of this work (Virginia Romero, Bijayita Thapa, and Raghdah Saem Aldahr).
Publisher Copyright:
© 2021 Elsevier B.V.
PY - 2021/9
Y1 - 2021/9
N2 - Internet of Things (IoT) systems are exposed to a large variety of threats due to the inclusion of many devices which may have different owners and manufacturers. IoT applications often include parts in clouds and fogs as well as being part of larger cyber-physical systems; that is, these systems are very complex, which also contributes to their security problems. The design of IoT-based applications must be able to handle this complexity and heterogeneity; patterns are a good approach for this purpose because of their abstraction power. When using patterns, a good catalog is necessary. We survey and classify existing IoT security patterns to see their coverage and quality to evaluate how appropriate they are to be part of a useful catalog. A practical catalog must cover most of the standard security mechanisms. Pattern descriptions include several sections according to a template. We conclude that the number of existing patterns is insufficient for a working catalog and most of them are incomplete or use different descriptions; we need to build a unified catalog. We have started in that direction by creating new patterns or rewriting existing patterns to make them follow a common description. To use the patterns, we need a secure development methodology and we survey IoT development methodologies; we find that none of them considers security or uses patterns. As a solution, we propose modifying existing pattern-based methodologies for distributed systems, of which there is a good variety, using one of them as reference for concreteness. We provide a list of possible research directions about these topics.
AB - Internet of Things (IoT) systems are exposed to a large variety of threats due to the inclusion of many devices which may have different owners and manufacturers. IoT applications often include parts in clouds and fogs as well as being part of larger cyber-physical systems; that is, these systems are very complex, which also contributes to their security problems. The design of IoT-based applications must be able to handle this complexity and heterogeneity; patterns are a good approach for this purpose because of their abstraction power. When using patterns, a good catalog is necessary. We survey and classify existing IoT security patterns to see their coverage and quality to evaluate how appropriate they are to be part of a useful catalog. A practical catalog must cover most of the standard security mechanisms. Pattern descriptions include several sections according to a template. We conclude that the number of existing patterns is insufficient for a working catalog and most of them are incomplete or use different descriptions; we need to build a unified catalog. We have started in that direction by creating new patterns or rewriting existing patterns to make them follow a common description. To use the patterns, we need a secure development methodology and we survey IoT development methodologies; we find that none of them considers security or uses patterns. As a solution, we propose modifying existing pattern-based methodologies for distributed systems, of which there is a good variety, using one of them as reference for concreteness. We provide a list of possible research directions about these topics.
KW - Internet of Things
KW - IoT applications
KW - IoT survey
KW - IoT systems design
KW - Microservices
KW - Misuse patterns
KW - Privacy patterns
KW - Reference architectures
KW - Secure systems development
KW - Security patterns
UR - http://www.scopus.com/inward/record.url?scp=85115032457&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85115032457&partnerID=8YFLogxK
U2 - 10.1016/j.iot.2021.100408
DO - 10.1016/j.iot.2021.100408
M3 - Article
AN - SCOPUS:85115032457
SN - 2542-6605
VL - 15
JO - Internet of Things (Netherlands)
JF - Internet of Things (Netherlands)
M1 - 100408
ER -