| Literature DB >> 27240360 |
Abstract
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.Entities:
Keywords: Common Criteria; IT security development; computer-aided security development; design pattern; intelligent sensor; knowledge engineering; security assurance
Year: 2016 PMID: 27240360 PMCID: PMC4934185 DOI: 10.3390/s16060759
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Block scheme of the CCMODE Tools suite.
Security target/protection profile patterns.
| Pattern Acronym | Pattern Name | Description |
|---|---|---|
| STp | Security Target pattern | Structure and contents of the security target (ST). |
| laSTp | low assurance Security Target pattern | Structure and contents of the low assurance security target used for EAL1 |
| PPp | Protection Profile pattern | Structure and contents of the protection profile (PP) |
| laPPp | low assurance Protection Profile pattern | Structure and contents of the low assurance protection profile used for EAL1 |
| SSTp | Site Security Target pattern | Structure and contents of the site security target (SST). |
Evaluation evidence patterns related to the development environment (site).
| Pattern Family | Name | Description |
|---|---|---|
| ALC_LCDp | Life-cycle model definition patterns | Presents high-level description of the TOE life-cycle and provides a framework for the entire development environment. |
| ALC_DVSp | Development security patterns | Specifies physical, procedural, personnel, and other security measures to be used in the development environment to protect the TOE and its parts. |
| ALC_CMCp | Configuration management (CM) capabilities patterns | Describes in detail the management of configuration items and enforces discipline and control in the processes of refinement and modification of the TOE and the related information. |
| ALC_CMSp | Configuration management scope pattern | Shows how to specify items to be included as configuration items and hence controlled by the above CM capabilities. |
| ALC_TATp | Tools and techniques patterns | Is responsible for control tools, their options and techniques used in the development environment (programming languages, documentation, implementation standards, runtime libraries, different equipment,
|
| ALC_DELp | Delivery patterns | Describes the secure transfer of the finished TOE from the development environment into the responsibility of the user. |
| ALC_FLRp | Flaw remediation patterns | Concerns the detected security flaws that should be traced and corrected by the developer. |
Evaluation evidence patterns related to the IT product.
| Pattern Family | Name | Description |
|---|---|---|
| ADV_ARCp | Security Architecture patterns | Describes the security architecture of the TOE security functions to show if they achieve desired properties (how to use architectural properties to better protect security functions). |
| ADV_FSPp | Functional specification patterns | Describes the TOE security functions (TSFs) interfaces (TSFIs) which contain the means for users to invoke a service from the TSF (by supplying data that are processed by the TSF) and the corresponding responses to those services invocations. |
| ADV_TDSp | TOE design patterns | Provides context for the TSFs description and describes the TSFs. The TOE decomposition is specified on different levels of detail (subsystems, modules) with respect to the applied rigour (EAL). |
| ADV_IMPp | Implementation representation patterns | Expresses how the TSFs are implemented (software/firmware/hardware design language source code, hardware/IC diagrams, layouts). |
| ADV_INTp | TSF internals patterns | Addresses the assessment of the TSFs internal structure. Well-structured TSFs are easier to implement and have fewer flaws and vulnerabilities. |
| ADV_SPMp | Security policy modelling patterns | Provides additional assurance from the development of a formal security policy model of the TSF and helps to gain correspondence between the functional specification and this security policy model. |
| AGD_PREp | Preparative procedures patterns | Presents how the TOE has been received and installed in a secure manner as intended by the developer. |
| AGD_OPEp | Operational user guidance patterns | Shows how to prepare written material intended for all types of users of the TOE in its evaluated configuration. |
| ATE_FUNp | Functional tests patterns | Enforces the right specification, execution and documentation of tests. |
| ATE_COVp | Test Coverage patterns | Helps to demonstrate that the above mentioned TSFIs are properly covered by tests. |
| ATE_DPTp | Test Depth patterns | Helps to demonstrate that the specified TOE design elements (subsystems, modules) are properly covered by tests. |
| ATE_INDp | Independent testing patterns | The ATE_IND evidences are elaborated by evaluators. This evidence is used to perform the tests provided by the developer and to perform additional tests defined by evaluator. |
Figure 2Configuring the MethSens project—EAL2 and its evidences.
Figure 3General view of the MethSens security model presented in the CCMODE EA-plugin—Security problem definition diagram.
Figure 4Generics expressing an illegal access attack. (A) Threat TDA.Access generic and its property; (B) Properties of the subject SNH.HighPotIntruder; (C) Data asset DTO.SensorData and its property.
Figure 5Generics expressing an attack against the sensor identifier. (A) Threat TDA.ReplaceNode generic and its property; (B) Properties of the subject SNH.HighPotIntruder; (C) Data asset DTO.SensorID and its property.
Figure 6Security objectives selection based on the ontology-produced rank list.
Figure 7General view of the MethSens security model presented in the CCMODE EA-plugin—a part of the security objectives diagram.
Figure 8MethSens security model presented in the CCMODE EA-plugin—mapping security functional requirements to security objectives.
Figure 9General view of the MethSens security model presented in the CCMODE EA-plugin—security functional requirements grouped by TOE security functions.
Figure 10Security model transferred to the elaborated evidence presented in the CCMODE GenDoc application.
Figure 11Part of the security target automatically elaborated on the basis of the security model with the use of the CCMODE GenDoc application.
Figure 12Self-evaluation of the MethSens security target presented by the CCMODE GenDoc application.