Abstract
Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (IoT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.
References
- Mohammad Aazam, Imran Khan, Aymen Abdullah Alsaffar, and Eui-Nam Huh. 2014. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. In 11th International Bhurban Conference on Applied Sciences and Technology (IBCAST’14). IEEE, 414--419.Google Scholar
Cross Ref
- U.S. Food 8 Drug Administration. 2017. Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott’s (formerly St. Jude Medical’s) Implantable Cardiac Pacemakers: FDA Safety Communication. https://www.fda.gov/medical-devices/safety-communications/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals.Google Scholar
- Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela Felicia Ciocarlie, and Ulf Lindqvist. 2017. Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM, 37--48.Google Scholar
Digital Library
- Milad Taleby Ahvanooey, Qianmu Li, Mahdi Rabbani, and Ahmed Raza Rajput. 2017. A survey on smartphones security: Software vulnerabilities, malware, and attacks. Int. J. Adv. Comput. Sci. Appl 8, 10 (2017), 30--45.Google Scholar
- Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys 8 Tutorials 17, 4 (2015), 2347--2376.Google Scholar
- Hamad Al-Mohannadi, Qublai Mirza, Anitta Namanya, Irfan Awan, Andrea Cullen, and Jules Disso. 2016. Cyber-Attack Modeling Analysis Techniques: An Overview. http://hdl.handle.net/10454/10703 Accessed: 2018-07-15.Google Scholar
- Naseer Amara, Huang Zhiqui, and Awais Ali. 2017. Cloud computing security threats and attacks with their mitigation techniques. In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 244--251. DOI:https://doi.org/10.1109/CyberC.2017.37Google Scholar
Cross Ref
- A. Amini, N. Jamil, A. R. Ahmad, and M. R. Z'aba. 2015. Threat modeling approaches for securing cloud computing. Journal of Applied Sciences 15, 7 (2015), 953.Google Scholar
Cross Ref
- Ioannis Andrea, Chrysostomos Chrysostomou, and George Hadjichristofi. 2015. Internet of Things: Security vulnerabilities and challenges. In IEEE Symposium on Computers and Communication (ISCC’15). IEEE, 180--187.Google Scholar
Digital Library
- Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. 2017. Understanding the Mirai Botnet. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1093--1110.Google Scholar
- Danilo Ardagna, Elisabetta Di Nitto, Giuliano Casale, Dana Petcu, Parastoo Mohagheghi, Sébastien Mosser, Peter Matthews, Anke Gericke, Cyril Ballagny, Francesco D’Andria, et al. 2012. Modaclouds: A model-driven approach for the design and execution of applications on multiple clouds. In 4th International Workshop on Modeling in Software Engineering. IEEE Press, 50--56.Google Scholar
Cross Ref
- Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et al. 2010. A view of cloud computing. Commun. ACM 53, 4 (2010), 50--58.Google Scholar
Digital Library
- Qazi Mamoon Ashraf and Mohamed Hadi Habaebi. 2015. Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications 49 (2015), 112--127.Google Scholar
Digital Library
- Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad. 2010. Proposed security model and threat taxonomy for the Internet of Things (IoT). In International Conference on Network Security and Applications. Springer, 420--429.Google Scholar
Cross Ref
- Jason Bau and John C. Mitchell. 2011. Security modeling and analysis. IEEE Security and Privacy 9, 3 (2011), 18.Google Scholar
Digital Library
- Alexander Bergmayr, Uwe Breitenbücher, Nicolas Ferry, Alessandro Rossini, Arnor Solberg, Manuel Wimmer, Gerti Kappel, and Frank Leymann. 2018. A systematic review of cloud modeling languages. ACM Comput. Surv. 51, 1, Article 22 (Feb. 2018), 38 pages. DOI:https://doi.org/10.1145/3150227Google Scholar
- Elisa Bertino and Nayeem Islam. 2017. Botnets and internet of things security. Computer 2 (2017), 76--79.Google Scholar
Digital Library
- S. Bojjagani and V. Sastry. 2017. VAPTAi: A threat model for vulnerability assessment and penetration testing of Android and iOS mobile banking apps. In 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC). 77--86. DOI:https://doi.org/10.1109/CIC.2017.00022Google Scholar
Cross Ref
- Spencer Breiner, Eswaran Subrahmanian, and Ram D. Sriram. 2016. Modeling the Internet of Things: A foundational approach. In 7th International Workshop on the Web of Things. ACM, 38--41.Google Scholar
- Ismail Butun, Patrik Österberg, and Houbing Song. 2019. Security of the Internet of Things: Vulnerabilities, attacks and countermeasures. IEEE Communications Surveys 8 Tutorials (2019).Google Scholar
- Ismail Butun, Alparslan Sari, and Patrik Österberg. 2019. Security implications of fog computing on the Internet of Things. In 2019 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 1--6.Google Scholar
Cross Ref
- S. A. Camtepe and B. Yener. 2007. Modeling and detection of complex attacks. In 2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007. 234--243. DOI:https://doi.org/10.1109/SECCOM.2007.4550338Google Scholar
Cross Ref
- Paul E. Ceruzzi. 2003. A History of Modern Computing. MIT press.Google Scholar
- Ching-Han Chen, Ming-Yi Lin, and Xing-Chen Guo. 2017. High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things. Computers 8 Electrical Engineering 61 (2017), 48--66.Google Scholar
- Mung Chiang and Tao Zhang. 2016. Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal 3, 6 (2016), 854--864.Google Scholar
Cross Ref
- Farida Chowdhury and Md Sadek Ferdous. [n.d.]. MODELLING CYBER ATTACKS. ([n.d.]).Google Scholar
- Cisco. 2014. Cisco IoT Reference Model. http://cdn.iotwf.com/resources/72/IoT_Reference_Model_04_June_2014.pdf. Accessed: 2018-06-24.Google Scholar
- Miguel Pupo Correia and Paulo Jorge Sousa. 2017. Segurança no Software (2nd ed.). FCA - Editora da Informática, Lda.Google Scholar
- Cloud Standards Customer Council. 2015. Cloud Customer Architecture for Mobile. https://www.omg.org/cloud/deliverables/cloud-customer-architecture-for-mobile.htm. Accessed: 2019-02-15.Google Scholar
- E. Curry and P. Grace. 2008. Flexible self-management using the model-view-controller pattern. IEEE Software 25, 3 (May 2008), 84--90. DOI:https://doi.org/10.1109/MS.2008.60Google Scholar
Digital Library
- Li Da Xu, Wu He, and Shancang Li. 2014. Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics 10, 4 (2014), 2233--2243.Google Scholar
Cross Ref
- G. Delac, M. Silic, and J. Krolo. 2011. Emerging security threats for mobile platforms. In 2011 Proceedings of the 34th International Convention MIPRO. 1468--1473.Google Scholar
- Premkumar T. Devanbu and Stuart Stubblebine. 2000. Software engineering for security: A roadmap. In Proceedings of the Conference on the Future of Software Engineering (ICSE’00). ACM, New York, NY, USA, 227--239. DOI:https://doi.org/10.1145/336512.336559Google Scholar
- Mark Dowd, John McDonald, and Justin Schuh. 2006. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Pearson Education.Google Scholar
- Hanan Elazhary. 2018. Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. Journal of Network and Computer Applications (2018).Google Scholar
- Nadia Elouali, José Rouillard, Xavier Le Pallec, and Jean-Claude Tarby. 2013. Multimodal interaction: A survey from model driven engineering and mobile perspectives. Journal on Multimodal User Interfaces 7, 4 (01 Dec 2013), 351--370. DOI:https://doi.org/10.1007/s12193-013-0126-zGoogle Scholar
Cross Ref
- F-Secure. 2019. 2019 Attack Landscape Report. https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-aboundGoogle Scholar
- Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, and Pedro R. M. Inácio. 2014. Security issues in cloud environments: A survey. International Journal of Information Security 13, 2 (2014), 113--170.Google Scholar
Digital Library
- Eduardo Fernandez, Juan Pelaez, and Maria Larrondo-Petrie. 2007. Attack patterns: A new forensic and design tool. In IFIP International Conference on Digital Forensics. Springer, 345--357.Google Scholar
Cross Ref
- Giancarlo Fortino, Raffaele Gravina, Wilma Russo, and Claudio Savaglio. 2017. Modeling and simulating internet-of-things systems: A hybrid agent-oriented approach. Computing in Science 8 Engineering 19, 5 (2017), 68--76.Google Scholar
- Mengmeng Ge and Dong Seong Kim. 2015. A framework for modeling and assessing security of the internet of things. In IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS’15). IEEE, 776--781.Google Scholar
- Google. 2019. PHA Family Highlights: Triada. https://security.googleblog.com/2019/06/pha-family-highlights-triada.html.Google Scholar
- Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi. 2016. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI global.Google Scholar
- B. B. Gupta and Omkar P. Badve. 2017. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing and Applications 28, 12 (2017), 3655--3682.Google Scholar
Digital Library
- Brij B. Gupta. 2018. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press.Google Scholar
- Mohammad Hamdaqa, Tassos Livogiannis, and Ladan Tahvildari. 2011. A reference model for developing cloud applications. In CLOSER. 98--103.Google Scholar
- Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, and Klaus Wehrle. 2011. Security challenges in the IP-based Internet of Things. Wireless Personal Communications 61, 3 (2011), 527--542.Google Scholar
Digital Library
- Henning Heitkötter, Tim A. Majchrzak, and Herbert Kuchen. 2013. Cross-platform model-driven development of mobile applications with MD 2. In Proceedings of the 28th Annual ACM Symposium on Applied Computing. ACM, 526--533.Google Scholar
- Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, and Robyn Lutz. 2002. A software fault tree approach to requirements analysis of an intrusion detection system. Requirements Engineering 7, 4 (1 Dec 2002), 207--220. DOI:https://doi.org/10.1007/s007660200016Google Scholar
- M. Shamim Hossain, Ghulam Muhammad, Wadood Abdul, Biao Song, and B. B. Gupta. 2018. Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems 83 (2018), 596--606.Google Scholar
Digital Library
- Upguard Inc. 2019. System Shock: How a Cloud Leak Exposed Accenture’s Business. https://www.upguard.com/breaches/cloud-leak-accenture.Google Scholar
- Jeffrey A. Ingalsbe, Dan Shoemaker, and Nancy R. Mead. 2011. Threat modeling the cloud computing, mobile device toting, consumerized enterprise-an overview of considerations. In AMCIS.Google Scholar
- IoT-A. 2013. Introduction to the Architectural Reference Model for the Internet of Things. http://iotforum.org/wp-content/uploads/2014/09/120613-IoT-A-ARM-Book-Introduction-v7.pdf. Accessed: 2018-07-03.Google Scholar
- S. M. Riazul Islam, Daehan Kwak, M. D. Humaun Kabir, Mahmud Hossain, and Kyung-Sup Kwak. 2015. The Internet of Things for health care: A comprehensive survey. IEEE Access 3 (2015), 678--708.Google Scholar
Cross Ref
- Ajit Jha and M. C. Sunil. 2014. Security considerations for Internet of Things. L8T Technology Services (2014).Google Scholar
- Feng Jiang, Yunsheng Fu, Brij B. Gupta, Fang Lou, Seungmin Rho, Fanzhi Meng, and Zhihong Tian. 2018. Deep learning based multi-channel intelligent attack detection for data security. IEEE Transactions on Sustainable Computing (2018).Google Scholar
- Georgios Kambourakis, Constantinos Kolias, and Angelos Stavrou. 2017. The Mirai Botnet and the IoT zombie armies. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM). IEEE, 267--272.Google Scholar
Cross Ref
- M. Kazim and D. Evans. 2016. Threat modeling for services in cloud. In 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). 66--72. DOI:https://doi.org/10.1109/SOSE.2016.55Google Scholar
Cross Ref
- Jintae Kim, Minseong Kim, and Sooyong Park. 2006. Goal and scenario based domain requirements analysis environment. Journal of Systems and Software 79, 7 (2006), 926--938. DOI:https://doi.org/10.1016/j.jss.2005.06.046 Selected papers from the 11th Asia Pacific Software Engineering Conference (APSEC2004).Google Scholar
Digital Library
- Ruslan Kirichek, Andrei Vladyko, Maxim Zakharov, and Andrey Koucheryavy. 2016. Model networks for Internet of Things and SDN. In 18th International Conference on Advanced Communication Technology (ICACT’16). IEEE, 76--79.Google Scholar
- Anneke G. Kleppe, Jos Warmer, Jos B. Warmer, and Wim Bast. 2003. MDA Explained: The Model Driven Architecture: Practice and Promise. Addison-Wesley Professional.Google Scholar
- Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv:1801.01203 (2018).Google Scholar
- Igor Kotenko and Andrey Chechulin. 2013. A cyber attack modeling and impact assessment framework. In 5th International Conference on Cyber Conflict (CyCon’13). IEEE, 1--24.Google Scholar
- AO Kaspersky Lab. 2016. Kaspersky Threats - Triada. https://threats.kaspersky.com/en/threat/Trojan.AndroidOS.Triada/.Google Scholar
- Mihai T. Lazarescu. 2013. Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3, 1 (2013), 45--54.Google Scholar
Cross Ref
- Wei Li, Igor Santos, Flavia C. Delicato, Paulo F. Pires, Luci Pirmez, Wei Wei, Houbing Song, Albert Zomaya, and Samee Khan. 2017. System modelling and performance evaluation of a three-tier Cloud of Things. Future Generation Computer Systems 70 (2017), 104--125.Google Scholar
Cross Ref
- Zhang Li and Tong Xin. 2013. Threat modeling and countermeasures study for the Internet of Things. Journal of Convergence Information Technology 8, 5 (2013).Google Scholar
- Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv:1801.01207 (2018).Google Scholar
- Torsten Lodderstedt, David Basin, and Jürgen Doser. 2002. SecureUML: A UML-based modeling language for model-driven security. In International Conference on the Unified Modeling Language. Springer, 426--441.Google Scholar
Cross Ref
- Junyan Ma, Xingshe Zhou, Shining Li, and Zhigang Li. 2011. Connecting agriculture to the Internet of Things through sensor networks. In 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing. IEEE, 184--187.Google Scholar
Digital Library
- Ashwin Manjunatha, Ajith Ranabahu, Amit Sheth, and Krishnaprasad Thirunarayan. 2010. A domain specific language based method to develop cloud-mobile hybrid applications. Kno. e. sis Center Wright State University (2010), 50--60.Google Scholar
- S. Manzoor, H. Zhang, and N. Suri. 2018. Threat modeling and analysis for the cloud ecosystem. In 2018 IEEE International Conference on Cloud Engineering (IC2E). 278--281. DOI:https://doi.org/10.1109/IC2E.2018.00056Google Scholar
Cross Ref
- J. P. McDermott. 2000. Attack net penetration testing. In 2000 Workshop on New Security Paradigms (NSPW’00). ACM, New York, 15--21. DOI:https://doi.org/10.1145/366173.366183Google Scholar
Digital Library
- Nenad Medvidovic and Richard N. Taylor. 2010. Software architecture: Foundations, theory, and practice. In 32nd ACM/IEEE International Conference on Software Engineering, Volume 2. ACM, 471--472.Google Scholar
- Daniel Mellado, Carlos Blanco, Luis E.Sánchez, and Eduardo Fernández-Medina. 2010. A systematic review of security requirements engineering. Computer Standards 8 Interfaces 32, 4 (2010), 153--165. DOI:https://doi.org/10.1016/j.csi.2010.01.006Google Scholar
- Microsoft. 2019. Microsoft Threat Modeling Tool 2016. https://www.microsoft.com/en-us/download/details.aspx?id=49168. Accessed: 2019-02-04.Google Scholar
- Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, and Mohammad Ashiqur Rahman. 2016. IoTSAT: A formal framework for security analysis of the Internet of Things (IoT). In IEEE Conference on Communications and Network Security (CNS’16). IEEE, 180--188.Google Scholar
Cross Ref
- Brice Morin, Nicolas Harrand, and Franck Fleurey. 2017. Model-based software engineering to tame the IoT jungle. IEEE Software 34, 1 (2017), 30--36.Google Scholar
Digital Library
- Francesco Moscato, Beniamino Di Martino, and Rocco Aversa. 2012. Enabling model driven engineering of cloud services by using mosaic ontology. Scalable Computing: Practice and Experience 13, 1 (2012), 29--44.Google Scholar
- Suvda Myagmar, Adam J. Lee, and William Yurcik. 2005. Threat modeling as a basis for security requirements. In Symposium on Requirements Engineering for Information Security (SREIS). Citeseer, 1--8.Google Scholar
- Xuan Thang Nguyen, Huu Tam Tran, Harun Baraki, and Kurt Geihs. 2015. FRASAD: A framework for model-driven IoT application development. In IEEE 2nd World Forum on Internet of Things (WF-IoT’15). IEEE, 387--392.Google Scholar
- Huansheng Ning, Hong Liu, and Laurence Yang. 2013. Cyber-entity security in the Internet of Things. Computer (2013), 1.Google Scholar
- Francisco José Barreto Nunes, Arnaldo Dias Belchior, and Adriano Bessa Albuquerque. 2010. Security engineering approach to support software security. In 2010 6th World Congress on Services. 48--55. DOI:https://doi.org/10.1109/SERVICES.2010.37Google Scholar
Digital Library
- Jon Oberheide and Farnam Jahanian. 2010. When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In 11th Workshop on Mobile Computing Systems 8 Applications. ACM, 43--48.Google Scholar
Digital Library
- Hersent Olivier, Boswarthick David, and Omar Elloumi. 2011. The ETSI M2M Architecture. Wiley-Blackwell, Chapter 14, 237--267. DOI:https://doi.org/10.1002/9781119958352.ch14 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119958352.ch14Google Scholar
- Andreas L. Opdahl and Guttorm Sindre. 2009. Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology 51, 5 (2009), 916--932.Google Scholar
Digital Library
- Open Web Application Security Project OWASP. 2017. Application Threat Modeling. https://www.owasp.org/index.php/Application_Threat_Modeling.Google Scholar
- Abilio G. Parada and Lisane B. De Brisolara. 2012. A model driven approach for android applications development. In Brazilian Symposium on Computing System Engineering (SBESC’12). IEEE, 192--197.Google Scholar
- Phoronix. 2019. The Performance Impact of MDS / Zombieload Plus the Overall Cost Now of Spectre/Meltdown/L1TF/MDS. https://www.phoronix.com/scan.php?page=article8item=mds-zombieload-mit8num=1.Google Scholar
- L. Piètre-Cambacédès and M. Bouissou. 2010. Beyond attack trees: Dynamic security modeling with Boolean Logic Driven Markov Processes (BDMP). In 2010 European Dependable Computing Conference. 199--208. DOI:https://doi.org/10.1109/EDCC.2010.32Google Scholar
Digital Library
- Ajith H. Ranabahu, Eugene Michael Maximilien, Amit P. Sheth, and Krishnaprasad Thirunarayan. 2011. A domain specific language for enterprise grade cloud-mobile hybrid applications. In Compilation of the Co-located Workshops on DSM’11, TMC’11, AGERE! 2011, AOOPES’11, NEAT’11, 8 VMIL’11 (SPLASH’11 Workshops). ACM, New York, 77--84. DOI:https://doi.org/10.1145/2095050.2095064Google Scholar
Digital Library
- Check Point Research. 2019. Securing the Cloud, Mobile and Internet of Things. http://snt.hr/news/pressroom/pressreleases/CP2019SecurityReportVolume03.pdf.Google Scholar
- Youssef Ridene and Franck Barbier. 2011. A model-driven approach for automating mobile applications testing. In 5th European Conference on Software Architecture: Companion Volume. ACM, 9.Google Scholar
Digital Library
- David Alejandro Robles-Ramirez, Ponciano Jorge Escamilla-Ambrosio, and Theo Tryfonas. 2017. IoTsec: UML extension for Internet of Things systems security modelling. In International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE’17). IEEE, 151--156.Google Scholar
Cross Ref
- James Rumbaugh, Ivar Jacobson, and Grady Booch. 2010. Unified Modeling Language Reference Manual (2nd ed.). Addison-Wesley Professional.Google Scholar
- Panagiotis Sarigiannidis, Eirini Karapistoli, and Anastasios A. Economides. 2017. Modeling the Internet of Things under attack: A G-network approach. IEEE Internet of Things Journal 4, 6 (2017), 1964--1977.Google Scholar
Cross Ref
- Mahadev Satyanarayanan. 1996. Fundamental challenges in mobile computing. In 15th Annual ACM Symposium on Principles of Distributed Computing. ACM, 1--7.Google Scholar
Cross Ref
- Riccardo Scandariato, Kim Wuyts, and Wouter Joosen. 2015. A descriptive study of Microsoft’s threat modeling technique. Requirements Engineering 20, 2 (2015), 163--180.Google Scholar
Digital Library
- Bruce Schneier. 1999. Attack trees. Dr. Dobb’s Journal 24, 12 (1999), 21--29.Google Scholar
- Continuum Security. 2019. IriusRisk - threat modeling tool. https://continuumsecurity.net/threat-modeling-tool/. Accessed: 2019-01-22.Google Scholar
- Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios Vasilakos, Julie Mccann, and Kin Leung. 2013. A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities. IEEE Wireless Communications 20, 6 (2013), 91--98.Google Scholar
Cross Ref
- Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76 (2015), 146--164.Google Scholar
Digital Library
- Guttorm Sindre and Andreas L. Opdahl. 2005. Eliciting security requirements with misuse cases. Requirements Engineering 10, 1 (2005), 34--44.Google Scholar
Digital Library
- Claudia M. Sosa-Reyna, Edgar Tello-Leal, and David Lara-Alabazares. 2018. Methodology for the model-driven development of service oriented IoT applications. Journal of Systems Architecture 90 (2018), 15--22.Google Scholar
Cross Ref
- Jan Steffan and Markus Schumacher. 2002. Collaborative attack modeling. In 2002 ACM Symposium on Applied Computing (SAC’02). ACM, New York, 253--259. DOI:https://doi.org/10.1145/508791.508843Google Scholar
Digital Library
- Tatiana Stepanova and D. Zegzhda. 2014. Applying large-scale adaptive graphs to modeling Internet of Things security. In 7th International Conference on Security of Information and Networks. ACM, 479.Google Scholar
- Christos Stergiou, Kostas E. Psannis, Byung-Gyu Kim, and Brij Gupta. 2018. Secure integration of IoT and cloud computing. Future Generation Computer Systems 78 (2018), 964--975.Google Scholar
Cross Ref
- Frank Swiderski and Window Snyder. 2004. Threat Modeling. Microsoft Press.Google Scholar
- Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, and Arturo Ribagorda. 2014. Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys Tutorials 16, 2 (2014), 961--987. DOI:https://doi.org/10.1109/SURV.2013.101613.00077Google Scholar
Cross Ref
- Symantec. 2019. 2019 Internet Security Threat Report. https://www.symantec.com/en/uk/security-center/threat-report.Google Scholar
- Hassan Takabi, James B.D. Joshi, and Gail-Joon Ahn. 2010. Security and privacy challenges in cloud computing environments. IEEE Security 8 Privacy6 (2010), 24--31.Google Scholar
- T. Tidwell, R. Larson, K. Fitch, and J. Hale. 2001. Modeling internet attacks. In 2001 IEEE Workshop on Information Assurance and Security, Vol. 59. United States Military Academy West Point, NY.Google Scholar
- Ikram Ullah, Munam Ali Shah, Abdul Wahid, Amjad Mehmood, and Houbing Song. 2018. ESOT: A new privacy model for preserving location privacy in Internet of Things. Telecommunication Systems 67, 4 (2018), 553--575.Google Scholar
Digital Library
- Muhammad Usman, Muhammad Zohaib Iqbal, and Muhammad Uzair Khan. 2014. A model-driven approach to generate mobile applications for multiple platforms. In Software Engineering Conference (APSEC), 2014 21st Asia-Pacific, Vol. 1. IEEE, 111--118.Google Scholar
Digital Library
- Jeisson Vergara-Vargas and Henry Umaña-Acosta. 2017. A model-driven deployment approach for scaling distributed software architectures on a cloud computing platform. In 8th IEEE International Conference on Software Engineering and Service Science (ICSESS’17). IEEE, 99--103.Google Scholar
Cross Ref
- Mališa Vučinić, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, and Roberto Guizzetti. 2015. OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks 32 (2015), 3--16.Google Scholar
Digital Library
- Andrew Whitmore, Anurag Agarwal, and Li Da Xu. 2015. The Internet of Things - A survey of topics and trends. Information Systems Frontiers 17, 2 (2015), 261--274.Google Scholar
Digital Library
- Qian Xu, Pinyi Ren, Houbing Song, and Qinghe Du. 2016. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4 (2016), 2840--2853.Google Scholar
Cross Ref
- Zheng Yan, Peng Zhang, and Athanasios V. Vasilakos. 2014. A survey on trust management for Internet of Things. Journal of Network and Computer Applications 42 (2014), 120--134.Google Scholar
Cross Ref
- F. Ye and Y. Qian. 2017. A security architecture for networked Internet of Things devices. In GLOBECOM 2017-2017 IEEE Global Communications Conference. 1--6. DOI:https://doi.org/10.1109/GLOCOM.2017.8254021Google Scholar
Cross Ref
- Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. 2014. Internet of Things for smart cities. IEEE Internet of Things Journal 1, 1 (2014), 22--32.Google Scholar
Cross Ref
- Ting Zhao, Gang Zhang, and Lei Zhang. 2014. An overview of mobile devices security issues and countermeasures. In International Conference on Wireless Communication and Sensor Network (WCSN’14). IEEE, 439--443.Google Scholar
Digital Library
Index Terms
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems

Mário M. Freire


Comments