Designing Security and Privacy Requirements in Internet of Things: A Survey

by   Nada Alhirabi, et al.

The design and development process for the Internet of Things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across different nodes with different capabilities under different conditions. Secondly, IoT application development involves different software engineers such as desktop, web, embedded and mobile to cooperate. In addition, the development process required different software stacks to integrated together. Due to above complexities, more often non-functional requirements (such as security and privacy) tend to get ignored in IoT application development process. In this paper, we have reviewed techniques, methods and tools that are being developed to support incorporating security and privacy requirements into traditional application designs. By doing so, we aim to explore how those techniques could be applicable to the IoT domain. In this paper, we primarily focused on two different aspects: (1) design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy), and (2) proactive and reactive interaction techniques that can be used to support and augment the IoT application design process. Our goal is not only to analyse past research work but also to discuss their applicability towards the IoT.


page 1

page 7

page 9

page 17


Augmenting Software Engineering Processes Towards Designing Privacy Aware Internet of Things Applications

The design and development process for Internet of Things (IoT) applicat...

Semantics-based Privacy by Design for Internet of Things Applications

As Internet of Things (IoT) technologies become more widespread in every...

The Ifs and Buts of the Development Approaches for IoT Applications

The recent growth of the Internet of Things (IoT) devices has lead to th...

Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA

IoT applications are promising for future daily activities; therefore, t...

Microservices: Granularity vs. Performance

Microservice Architectures (MA) have the potential to increase the agili...

Reasoning about inter-procedural security requirements in IoT applications

The importance of information security dramatically increased and will f...

Please sign up or login with your details

Forgot password? Click here to reset