| Literature DB >> 22399888 |
Abstract
The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.Entities:
Keywords: Common Criteria; IT security development; design pattern; intelligent sensor; methane detector
Year: 2010 PMID: 22399888 PMCID: PMC3292127 DOI: 10.3390/s100504456
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Common Criteria related terms and acronyms [1]/Part1.
| Acronym | Meaning |
|---|---|
| assets | Entities that the owner of the TOE presumably places value upon. |
| assurance | Grounds for confidence that a TOE meets the SFRs. |
| attack potential | A measure of the effort to be expended in attacking a TOE, expressed in terms of an attacker's expertise, resources and motivation. |
| class | A grouping of CC families that share a common focus. |
| component | The smallest selectable set of elements on which requirements may be based. |
| connectivity | The property of the TOE which allows interaction with IT entities external to the TOE. This includes exchange of data by wire or by wireless means, over any distance in any environment or configuration. |
| development environment | The environment in which the TOE is developed. |
| element | An indivisible statement of security need. |
| evaluation | Assessment of a PP, an ST or a TOE, against defined criteria. |
| evaluation assurance level (EAL) | An assurance package, consisting of assurance requirements drawn from CC Part 3, representing a point on the CC predefined assurance scale. |
| family | A grouping of components that share a similar goal but may differ in emphasis or rigor. |
| formal | Expressed in a restricted syntax language with defined semantics based on well-established mathematical concepts. |
| identity | A representation (e.g., a string) uniquely identifying an authorized user, which can either be the full or abbreviated name of that user or a pseudonym. |
| informal | Expressed in natural language. |
| iteration | The use of the same component to express two or more distinct requirements. |
| life-cycle | The sequence of stages of existence of an object (for example a product or a system) in time. |
| life-cycle model | Description of the stages and their relations to each other that are used in the management of the life-cycle of a certain object, how the sequence of stages looks like and which high level characteristics the stages have. |
| object | A passive entity in the TOE, that contains or receives information, and upon which subjects perform operations. |
| operation (on a component of the CC) | Modifying or repeating that component. Allowed operations on components are assignment, iteration, refinement and selection. |
| operation (on an object) | A specific type of action performed by a subject on an object. |
| operational environment | The environment in which the TOE is operated. |
| organizational security policy (OSP) | A set of security rules, procedures, or guidelines imposed (or presumed to be imposed) now and/or in the future by an actual or hypothetical organization in the operational environment. |
| package | A named set of either functional or assurance requirements (e.g., EAL 3). |
| protection profile (PP) | An implementation-independent statement of security needs for a TOE type. |
| refinement | The addition of details to a component. |
| SAR | Security assurance requirement. |
| SFR | Security functional requirement. |
| security objective | A statement of intent to counter identified threats and/or satisfy identified organization security policies and/or assumptions. |
| security target (ST) | An implementation-dependent statement of security needs for a specific identified TOE. |
| semiformal | Expressed in a restricted syntax language with defined semantics. |
| subject | An active entity in the TOE that performs operations on objects. |
| target of evaluation (TOE) | A set of software, firmware and/or hardware possibly accompanied by guidance. |
| TOE security functionality (TSF) | A set consisting of all hardware, software, and firmware of the TOE that must be relied upon for the correct enforcement of the SFRs. |
| trusted channel | A means by which a TSF and a remote trusted IT product can communicate with necessary confidence. |
| trusted IT product | An IT product other than the TOE which has its security functional requirements administratively coordinated with the TOE and which is assumed to enforce its security functional requirements correctly (e.g., by being separately evaluated). |
| trusted path | A means by which a user and a TSF can communicate with necessary confidence. |
Figure 1.Generalized model of the intelligent sensor used for security analyses during the IT security development process [3].
Family field defining assets and other passive entities.
| Prefix | Meaning |
|---|---|
| “DTO” | “TOE related assets” |
| “DEO” (former “DIT”) | “assets within the TOE operational environment” |
| “DES” (former “DAP”) | “assets within the TOE site” |
Family field defining subjects and other active entities.
| Prefix | Meaning |
|---|---|
| “SAU” | “authorized subject, e.g., user, administrator, process” |
| “SNA” | “unauthorized entity, e.g., intruder” |
| “SNH” | “non-human malicious entity, e.g., force majeure, failure” |
Family field defining threats.
| Prefix | Meaning |
|---|---|
| “TDA” | “direct attacks against the TOE” |
| “TEO” (former “TIT”) | “attacks against the TOE operational environment” |
| “TES” (former “TPH”) | “attacks against the TOE site” |
Family field concerning assumptions.
| Prefix | Meaning |
|---|---|
| “ACN” | “connectivity aspects” |
| “APR” | “personnel/organizational aspects” |
| “APH” | “physical aspects” |
Family field for Organizational Security Policies and security objectives.
| Security objective prefix | OSP prefix | Meaning |
|---|---|---|
| “OACC” | “PACC” | “access control and information flow control” |
| “OIDA” | “PIDA” | “identification and authentication” |
| “OADT” | “PADT” | “accountability and security audit” |
| “OINT” | “PINT” | “integrity” |
| “OAVB” | “PAVB” | “availability” |
| “OPRV” | “PPRV” | “privacy” |
| “ODEX” | “PDEX” | “data exchange” |
| “OCON” | “PCON” | “confidentiality” |
| “OEIT” | “PEIT” | “IT aspects of the TOE operational environment or site” |
| “OEPH” | “PEPH” | “technical/physical aspects of the TOE operational environment or site” |
| “OSMN” | “PSMN” | “security maintenance” |
Family field related to the security functions.
| Prefix | Meaning |
|---|---|
| “SFAU” | “security functions dealing with audit” |
| “SFCO” | “security functions dealing with communication” |
| “SFCS” | “security functions dealing with cryptographic support” |
| “SFDP” | “security functions dealing with user data protection” |
| “SFIA” | “security functions dealing with identification and authentication” |
| “SFMT” | “security functions dealing with security management” |
| “SFPR” | “security functions dealing with privacy issues” |
| “SFPT” | “security functions dealing with the protection of the TSF” |
| “SFRU” | “security functions dealing with resource utilization” |
| “SFTA” | “security functions dealing with the TOE access” |
| “SFTP” | “security functions dealing with trusted path/channels” |
Enhanced generics representing protected assets and other passive entities.
| Prefix, mnemonic | Description |
|---|---|
| Basic assets | |
| Assets related to the sensor availability | |
| Security-related data | |
| Assets related to the sensor operational environment | |
| Assets related to the sensor site processes (considered optionally) | |
TOE security functions—examples related to the motion sensor project [16].
| Prefix, mnemonic | Description |
|---|---|
Enhanced generics representing subjects, intruders and other active entities.
| Prefix, mnemonic | Description |
|---|---|
| Legal users | |
| Legal actors participating in the life cycle processes (considered optionally) | |
| Intruders | |
| Intruders relevant to the site processes (considered optionally) | |
Direct attacks against the intelligent sensor (TOE)—threats expressed by enhanced generics.
| Prefix, mnemonic | Description |
|---|---|
| Threats against data sampled/measured by the sensor (TOE) | |
| Direct attacks against data stored, processed and transferred by the sensor (TOE) | |
| Threats exploiting vulnerabilities related to the restricted resources | |
| Threats against the sensor identity | |
| Attacks against the security-related data | |
| Threats dealing with the sensor integrity | |
| Unforeseen natural catastrophes, emergencies and failures | |
Threats related to the TOE operational environment expressed by enhanced generics.
| Prefix, mnemonic | Description |
|---|---|
| Attacks against sensor network and transmission ability (TOE operational environment) | |
| Attacks causing safety problems | |
| Attacks exploiting vulnerabilities related to insufficient administration | |
Threats related to the TOE development-, manufacturing- and maintaining processes expressed by enhanced generics (considered optionally).
| Prefix, mnemonic | Description |
|---|---|
| Attack on the development-, manufacturing- and maintenance environment | |
Enhanced generics representing Organizational Security Policies.
| Prefix, mnemonic | Description |
|---|---|
| OSPs related to the TOE | |
| OSPs related to the TOE operational environment | |
| OSPs related to the site processes (considered optionally) | |
Enhanced generics representing assumptions.
| Prefix, mnemonic | Description |
|---|---|
| Assumptions related to the TOE operational environment | |
| Assumptions related to the site processes (considered optionally) | |
Enhanced generics representing security objectives.
| Prefix, mnemonic | Description |
|---|---|
| Security objectives concerning mainly the TOE | |
| Security objectives concerning mainly the TOE operational environment | |
| Security objectives concerning the site processes | |