Vulnerability Assessment of Sensor Systems
There are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products. Still, sens...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/11/2518 |
_version_ | 1798035051246518272 |
---|---|
author | Andrzej Bialas |
author_facet | Andrzej Bialas |
author_sort | Andrzej Bialas |
collection | DOAJ |
description | There are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products. Still, sensor security facilities and methodologies are relatively poor compared to other IT products. That is why a methodical approach to the sensor IT security is needed, i.e., risk management, implementation of countermeasures, vulnerability removal, and security evaluation and certification. The author proposes to apply the main security assurance methodology specified in ISO/IEC 15408 Common Criteria to solve specific security problems of sensors. A new Common Criteria compliant method is developed which specifies the vulnerability assessment process and related data in a structured way. The input/output data of the introduced elementary evaluation processes are modeled as ontology classes to work out knowledge bases. The validation shows that sensor-specific knowledge can be acquired during the vulnerability assessment process and then placed in knowledge bases and used. The method can be applied in different IT products, especially those with few certifications, such as sensors. The presented methodology will be implemented in a software tool in the future. |
first_indexed | 2024-04-11T20:52:50Z |
format | Article |
id | doaj.art-735bbb9b1ed846afb9d75b0862a71590 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-11T20:52:50Z |
publishDate | 2019-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-735bbb9b1ed846afb9d75b0862a715902022-12-22T04:03:47ZengMDPI AGSensors1424-82202019-06-011911251810.3390/s19112518s19112518Vulnerability Assessment of Sensor SystemsAndrzej Bialas0ŁUKASIEWICZ Research Network—Institute of Innovative Technologies EMAG, 40-189 Katowice, Leopolda 31, PolandThere are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products. Still, sensor security facilities and methodologies are relatively poor compared to other IT products. That is why a methodical approach to the sensor IT security is needed, i.e., risk management, implementation of countermeasures, vulnerability removal, and security evaluation and certification. The author proposes to apply the main security assurance methodology specified in ISO/IEC 15408 Common Criteria to solve specific security problems of sensors. A new Common Criteria compliant method is developed which specifies the vulnerability assessment process and related data in a structured way. The input/output data of the introduced elementary evaluation processes are modeled as ontology classes to work out knowledge bases. The validation shows that sensor-specific knowledge can be acquired during the vulnerability assessment process and then placed in knowledge bases and used. The method can be applied in different IT products, especially those with few certifications, such as sensors. The presented methodology will be implemented in a software tool in the future.https://www.mdpi.com/1424-8220/19/11/2518intelligent sensorIT security evaluationsecurity assuranceCommon Criteriavulnerability assessment |
spellingShingle | Andrzej Bialas Vulnerability Assessment of Sensor Systems Sensors intelligent sensor IT security evaluation security assurance Common Criteria vulnerability assessment |
title | Vulnerability Assessment of Sensor Systems |
title_full | Vulnerability Assessment of Sensor Systems |
title_fullStr | Vulnerability Assessment of Sensor Systems |
title_full_unstemmed | Vulnerability Assessment of Sensor Systems |
title_short | Vulnerability Assessment of Sensor Systems |
title_sort | vulnerability assessment of sensor systems |
topic | intelligent sensor IT security evaluation security assurance Common Criteria vulnerability assessment |
url | https://www.mdpi.com/1424-8220/19/11/2518 |
work_keys_str_mv | AT andrzejbialas vulnerabilityassessmentofsensorsystems |