Skip to main content

Lego Methodology Approach for Common Criteria Certification of IoT Telemetry

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 931)

Abstract

In our days, almost every business relays on medium-to-high performance computer systems which presents the possibility of being the target of different threats that can exploit the vulnerable software, respectively hardware components. The concept of “security risk” can be described as a specific threat that using a specific type of attack presents the ability to exploit system vulnerabilities, action which will affect the entire integrity of the targeted systems. From this point of view, the main idea of this paper is to present a Lego methodology approach for Common Criteria certification that can be applied to IoT Telemetry systems. Furthermore, we present scenarios of implementation of our approach to increase robustness level applied for agro-telemetry system.

Keywords

  • Lego methodology
  • Common Criteria
  • IoT
  • Telemetry
  • Security

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-16184-2_17
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   269.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-16184-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   349.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.

References

  1. Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)

    CrossRef  Google Scholar 

  2. da Cruz, M.A., Rodrigues, J.J., Paradello, E.S., Lorenz, P., Solic, P., Albuquerque, V.H.C.: A proposal for bridging the message queuing telemetry transport protocol to HTTP on IoT solutions. In: 3rd International Conference on Smart and Sustainable Technologies (SpliTech), pp. 1–5. IEEE (2018)

    Google Scholar 

  3. ETSI France, Orange France: Internet of Things Global Standardisation-State of Play (2018)

    Google Scholar 

  4. Lesjak, C., Hein, D., Winter, J.: Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society, pp. 002589–002595. IEEE (2015)

    Google Scholar 

  5. Martin, B.A., Michaud, F., Banks, D., Mosenia, A., Zolfonoon, R., Irwan, S., Zao, J.K.: OpenFog security requirements and approaches. In: IEEE Fog World Congress (FWC), pp. 1–6. IEEE (2017)

    Google Scholar 

  6. Thomas, M.O., Rad, B.B.: Reliability evaluation metrics for internet of things, car tracking system: a review. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 9(2), 1–10 (2017)

    Google Scholar 

  7. Bialas, A.: Common criteria IT security evaluation methodology–an ontological approach. In: International Conference on Dependability and Complex Systems, pp. 23–34. Springer, Cham (2018)

    Google Scholar 

  8. Communications Security Establishment. https://www.cse-cst.gc.ca/en/canadian-common-criteria-scheme/main. Accessed 01 Oct 2018

  9. Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model, Version 3.1, Revision 4 (2012)

    Google Scholar 

  10. Common Criteria for IT security evaluation. https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_50en.pdf.pdf. Accessed 01 Oct 2018

  11. Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance components, Version 3.1, Revision 5 (2017)

    Google Scholar 

  12. Chae, H., Lee, D.H., Park, J., In, H.P.: The partitioning methodology in hardware/software co-design using extreme programming: evaluation through the lego robot project, pp. 187. IEEE (2006)

    Google Scholar 

  13. Suciu, G., Istrate, C., Petrache, A., Schlachet, D., Buteau, T.: On demand secure isolation using security models for different system management platforms. In: Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX, vol. 10977, p. 109770R (2019)

    Google Scholar 

Download references

Acknowledgements

This work has been supported in part by UEFISCDI Romania through projects ODSI, ToR-SIM and PARFAIT, funded in part by European Union’s Horizon 2020 research and innovation program under grant agreement No. 777996 (SealedGRID project) and No. 787002 (SAFECARE project).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Suciu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Suciu, G., Istrate, C., Petre, I., Scheianu, A. (2019). Lego Methodology Approach for Common Criteria Certification of IoT Telemetry. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_17

Download citation