Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments

Achieving Security, Privacy, Dependability and Interoperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time. This paper highlights an approach to tackling the above challenges, through the definition of pattern language and a framework that can guarantee SPDI in IoT orchestrations. By integrating pattern reasoning engines at the various layers of the IoT infrastructure, and a machine-processable representation of said pattern through Drools rules, the proposed framework can provide ways to fulfill SPDI requirements at design time, and also provide the means to guarantee those SPDI properties and manage the orchestrations accordingly. Moreover, an application example of the framework is presented in an Industrial IoT monitoring environment.

[1]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[2]  Lukács Adrienn,et al.  What is Privacy? The History and Definition of Privacy , 2016 .

[3]  Charles L. Forgy,et al.  Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..

[4]  Markus Schumacher,et al.  Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .

[5]  Ioannis G. Askoxylakis,et al.  Fault Tolerance Using an SDN Pattern Framework , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[6]  Markus Schumacher,et al.  Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.

[7]  Charles L. Forgy,et al.  Rete: a fast algorithm for the many pattern/many object pattern match problem , 1991 .

[8]  Gian Luigi Ferrari,et al.  Semantics-Based Design for Secure Web Services , 2008, IEEE Transactions on Software Engineering.

[9]  George Spanoudakis,et al.  Architectural Patterns for Secure IoT Orchestrations , 2019, 2019 Global IoT Summit (GIoTS).

[10]  Ioannis G. Askoxylakis,et al.  RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems , 2015, HCI.

[11]  Ioannis Papaefstathiou,et al.  Policy-based access control for DPWS-enabled ubiquitous devices , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).

[12]  Charalampos Manifavas,et al.  Secure policy-based management solutions in heterogeneous embedded systems networks , 2012, 2012 International Conference on Telecommunications and Multimedia (TEMU).

[13]  Ernesto Damiani,et al.  Extensions to pattern formats for cyber physical systems , 2014 .

[14]  Ioannis G. Askoxylakis,et al.  The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0 , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[15]  Gregory D. Abowd,et al.  Formalizing style to understand descriptions of software architecture , 1995, TSEM.

[16]  Jing Dong,et al.  Automated verification of security pattern compositions , 2010, Inf. Softw. Technol..

[17]  Manachai Toahchoodee,et al.  Verification and Trade-Off Analysis of Security Properties in UML System Models , 2010, IEEE Transactions on Software Engineering.

[18]  George Spanoudakis,et al.  Pattern-Based Design and Verification of Secure Service Compositions , 2020, IEEE Transactions on Services Computing.

[19]  Ioannis G. Askoxylakis,et al.  The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network , 2018, Comput. Commun..

[20]  Eduardo B. Fernández,et al.  A Pattern-Driven Security Process for SOA Applications , 2008, ARES.

[21]  Jan Jürjens,et al.  Sound development of secure service-based systems , 2004, ICSOC '04.

[22]  Michelle Finneran Dennedy,et al.  The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value , 2014 .