Advertisement

Towards Model-Based Communication Control for the Internet of Things

  • Imad Berrouyne
  • Mehdi Adda
  • Jean-Marie Mottu
  • Jean-Claude Royer
  • Massimo Tisi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11176)

Abstract

Most of existing Model-Driven Engineering (MDE) approaches for the Internet of Things (IoT) focus on means of modeling the behavior of end devices. Little attention has been paid to network-related abstractions and communication control. The paper introduces an approach towards enabling model-based communication control in a network of things. First, we suggest a Domain Specific Language (DSL) to abstract basic network features. Second, we propose a policy language to control the communications within the network. Finally, as a proof-of-concept, we present a code generation process to enforce the expressed policy at runtime.

Keywords

Internet of Things Model-Driven Engineering Networking Publish/subscribe Communication control 

References

  1. 1.
    Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16–25. IEEE (2017)Google Scholar
  2. 2.
    Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1–10(2011)Google Scholar
  3. 3.
    Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)CrossRefGoogle Scholar
  4. 4.
    OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013)Google Scholar
  5. 5.
    Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995)Google Scholar
  6. 6.
    Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004)Google Scholar
  7. 7.
    Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402–406. IEEE (2004)Google Scholar
  8. 8.
    Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptionsGoogle Scholar
  9. 9.
    UK Egham: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017)Google Scholar
  10. 10.
    Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110–126 (2015)CrossRefGoogle Scholar
  11. 11.
    Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125–135 (2016)Google Scholar
  12. 12.
    Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85–88 (2015)CrossRefGoogle Scholar
  13. 13.
    Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRefGoogle Scholar
  14. 14.
    Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017)Google Scholar
  15. 15.
    Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015)Google Scholar
  16. 16.
    Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Schätz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52–68. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-41533-3_4CrossRefGoogle Scholar
  17. 17.
    Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395–400. IEEE (2017)Google Scholar
  18. 18.
    Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30–36 (2017)CrossRefGoogle Scholar
  19. 19.
    Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003)Google Scholar
  20. 20.
    Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1–22 (2014)Google Scholar
  21. 21.
    Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish/subscribe systems. JNW 2(2), 57–67 (2007)CrossRefGoogle Scholar
  22. 22.
    Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015)Google Scholar
  23. 23.
    Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172–177. IEEE (2018)Google Scholar
  24. 24.
    Shen, H.: Content-based publish/subscribe systems. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds.) Handbook of Peer-to-Peer Networking, pp. 1333–1366. Springer, Boston (2010).  https://doi.org/10.1007/978-0-387-09751-0_49CrossRefzbMATHGoogle Scholar
  25. 25.
    Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017)Google Scholar
  26. 26.
    Vasilevskiy, A., Morin, B., Haugen, Ø., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016)Google Scholar
  27. 27.
    Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Imad Berrouyne
    • 1
  • Mehdi Adda
    • 2
  • Jean-Marie Mottu
    • 1
  • Jean-Claude Royer
    • 1
  • Massimo Tisi
    • 1
  1. 1.Naomod Team, IMT Atlantique, LS2NNantesFrance
  2. 2.Mathematics, Computer Science and Engineering DepartmentUniversity of Quebec At RimouskiRimouskiCanada

Personalised recommendations