Home // CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems // View article
Security Requirement Modeling for a Secure Local Energy Trading Platform
Authors:
Yasamin Mahmoodi
Christoph Groß
Sebastian Reiter
Alexander Viehl
Oliver Bringmann
Keywords: Security analysis, IoT, Security requirement, Security-by-design.
Abstract:
The Internet of Things (IoT) paradigm has become important in many domains, ranging from smart home to medical and industrial applications. However, besides the outstanding advantages, comprehensive networking raises new security challenges. To benefit from IoT, secure embedded systems and resilient architectures are mandatory. Security-by-design is a cost efficient approach to accomplish this objective. Security requirement analysis as the first step of security-by-design plays an important role to design, develop and test secure embedded systems. This paper presents a case study to demonstrate security requirement modeling at three abstraction levels with the focus on the CIA triad (Confidentiality, Integrity, Availability). The methodology is demonstrated by applying the proposed approach to a use case from the energy domain.
Pages: 80 to 85
Copyright: Copyright (c) IARIA, 2020
Publication date: October 25, 2020
Published in: conference
ISSN: 2519-8599
ISBN: 978-1-61208-818-1
Location: Nice, France
Dates: from October 25, 2020 to October 29, 2020