Abstract
Due to the wide scope of technical issues involved, IIoT projects require Systems Development Methods (SDMs) to deal with the entire complex process. With so many issues to solve, security is often left until the main functional pillars have already been established. Thus, the security standards for IIoT and IoT SDMs are not fully integrated, which leads to projects that do not meet the security-by-Design requirement. In this article, we present IgniteSec, a new method that combines the Ignite System Development Method with the security standard for industrial systems NIST 800-82. The case study carried out with IgniteSec shows that, by uniting these two fronts from the first stages, the project arrives at the software design stage with the important functional and security elements well integrated into the design and in compliance with security standard.
Similar content being viewed by others
References
Middleton P, Velosa A, Biscotti F. Forecast analysis: enterprise IoT platforms, worldwide. Gartner Res. 2020. https://www.gartner.com/en/documents/3983783/forecast-analysis-enterprise-iot-platforms-worldwide. Accessed in 18 June 2021.
Fahmideh M, Zowghi D. An exploration of IoT platform development. Inf Syst. 2020. https://doi.org/10.1016/j.is.2019.06.005.
Hassan QF, Madani SA, Morrish J, Bhatnagar RM. Internet of Things: challenges, advances, and applications. Boca Raton: Taylor & Francis Group; 2018.
Tekinerdoğan B, Tüzün E, Giray G. IoT system development methods, Book chapter. Boca Raton: Taylor & Francis Group; 2018. https://doi.org/10.1201/9781315155005.
Positive Technologies. ICS vulnerabilities: 2018 in review. Accessed in: https://www.ptsecurity.com/upload/corporate/ww-en/analytics/ICS-vulnerabilities-2019-eng.pdf.
Yaacoub JA, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M. Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst. 2020;77:103201. https://doi.org/10.1016/j.micpro.2020.103201.
Trinca Ann Y, Vishik C, Matsubara M, Plonk A. Key concepts in cyber security: towards a common policy and technology context for cyber security norms. Tallinn: NATO CCD COE Publications; 2016.
Thomas RJ, Chothia T, et al. Learning from Vulnerabilities–categorising, understanding and detecting weaknesses in industrial control systems. In: Katsikas S, et al., editors. Computer security. CyberICPS 2020, SECPRE 2020, ADIoT 2020. Lecture notes in computer science, vol. 12501. Cham: Springer; 2020. https://doi.org/10.1007/978-3-030-64330-0_7.
Jacobson I, Spence I, Pan-Wei N. Is there a single method for the Internet of Things? Acm Queue. 2017. https://doi.org/10.1145/3121437.3123501.
Leszczyna R. Approaching secure industrial control systems. ET Inf Secur. 2014;9(1):81–9. https://doi.org/10.1049/iet-ifs.2013.0159.
Zambonelli F. Key abstractions for IoT-oriented software engineering. IEEE Softw IEEE. 2017;34(1):38–45. https://doi.org/10.1109/MS.2017.3.
Patel P, Cassou D. Enabling high-level application development for the Internet of Things. J Syst Softw 2015;103:62–84. arXiv:1501.05080.
Fortino G, Rango F, Russo W. ELDAMeth design process. In: Cossentino M, Hilaire V, Molesini A, Seidita V, editors. Handbook on AgentOriented Design Processes. Heidelberg: Springer, Berlin; 2014. p. 115–39.
Fortino G, Guerrieri A, Russo W, Savaglio C. Towards a development methodology for smart object-oriented IoT systems: a metamodel approach. In: IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, China, 2015, p. 1297–302. https://doi.org/10.1109/SMC.2015.231.
Giray G, Tekinerdogan B. Situational method engineering for constructing Internet of Things development methods. In: Business Modeling and Software Design—8th International Symposium, BMSD 2018, Proceedings, vol. 319. Springer. p. 221–239. https://doi.org/10.1007/978-3-319-94214-8_14.
IoT methodology—the Internet of Things project lifecycle guide for creative, technical and business people. http://www.iotmethodology.com/. Accessed in 02 Feb 2022.
Merzouk S, Elhadi S, Cherkaoui A, Marzak A, Sael N. Agile software development: comparative study. SSRN Electron J. 2018. https://doi.org/10.2139/ssrn.3186323.
Knaster R. SAFe 4.0 distilled: applying the scaled agile framework for lean software and systems engineering. Boston: Addison-Wesley; 2017.
Sahoo KS, Tiwary M, Luhach AK, Nayyar A, Choo KKR, Bilal M. Demand-Supply based economic model for resource provisioning in industrial loT traffic. IEEE Internet of Things Journal. 2021;. https://doi.org/10.1109/JIOT.2021.3122255.
Merzouk S, Cherkaoui A, Marzak A, Nawal S. IoT methodologies: comparative study. Procedia Comput Sci. 2020;175:585–90. https://doi.org/10.1016/j.procs.2020.07.084 (ISSN 1877-0509).
International Society of Automation. New ISA/IEC 62443 standard specifies security capabilities for control system components. 2019. https://www.isa.org/intech-plus/2019/may/new-isa-iec-62443-standard-specifies-security-capa.
International Organization for Standardization. Information technology—security techniques—information security management systems—overview and vocabulary. Fifth edition, 2018-02. https://www.iso.org/standard/73906.html.
Stouffer K, Lightman S, Pillitteri V, Abrams M, Hahn A. Guide to industrial control systems (ICS) security. NIST Special Publication, vol. 800, no. 82 Revision 2, p. 1–247, 2015.
Slama D, Puhlmann F, Morrish J, Bhatnagar RM. Enterprise IoT: strategies and best practices for connected products and services. Sebastopol: O’Reilly Media, Inc.; 2016.
Object Management Group. Business process model and notation. https://www.bpmnquickguide.com/view-bpmn-quick-guide/.
Joint Task Force. Risk management framework for information systems and organizations: a system life cycle approach for security and privacy. NIST Special Publication, vol. 800, no. 37 Revision 2, p. 1–183, 2018. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf.
Rainer R, Marshall T, Knapp K, Montgomery G. Do information security professionals and business managers view information security issues differently? Inf Syst Secur. 2007;16(2):100–8. https://doi.org/10.1080/10658980701260579.
Labrado C, Thapliyal H, Prowell S, Kuruganti T. Use of thermistor temperature sensors for cyber-physical system security. Sensors (Basel, Switzerland). 2019;19(18):3905. https://doi.org/10.3390/s19183905.
Rocio P, Diego-Mas J, Leon-Medina D. Measuring the project management complexity: the case of information technology projects. complexity, Hindawi, vol 2018, Article ID 6058480, 19 pages. https://doi.org/10.1155/2018/6058480.
Sophia Antipolis. European Parliament makes eCall mandatory from 2018. 7 May 2015.https://www.etsi.org/newsroom/news/960-2015-05-european-parliament-makes-ecall-mandatory-from-2018.
Economic and Social Council—United Nations, proposal for new regulation no. XXX on accident emergency call systems (AECS). 2017. https://unece.org/DAM/trans/doc/2017/wp29/ECE-TRANS-WP29-2017-132e.pdf.
Le VH, den Hartog J, Zannone N. Security and privacy for innovative automotive applications: a survey. Comput Commun. 2018;132:17–41. https://doi.org/10.1016/j.comcom.2018.09.010 (ISSN 0140-3664).
ŽabenskýRadomír J, Ščurek R, Jeremy Toh WH. Experimental verification of selected risk factors disrupting eCall system function. Trans VŠB Tech Univ Ostrava Saf Eng Ser. 2015. http://dx.doi.org/10.1515/tvsbses-2015-0003.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This paper does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Brandao Filho, S.B., Cesar, C.d.C. A Secure Method for Industrial IoT Development. SN COMPUT. SCI. 3, 173 (2022). https://doi.org/10.1007/s42979-022-01061-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01061-9