=Paper= {{Paper |id=Vol-2739/paper_1 |storemode=property |title=Risk Assessment in IoT Case Study: Collaborative Robots System |pdfUrl=https://ceur-ws.org/Vol-2739/paper_1.pdf |volume=Vol-2739 |authors=Salim Chehida,Abdelhakim Baouya,Miquel Cantero,Paul-Emmanuel Brun,Guillemette Massot |dblpUrl=https://dblp.org/rec/conf/sam-iot/ChehidaBCBM20 }} ==Risk Assessment in IoT Case Study: Collaborative Robots System== https://ceur-ws.org/Vol-2739/paper_1.pdf
                       Risk Assessment in IoT
               Case Study: Collaborative Robots System
                   Salim Chehida, Abdelhakim Baouya                                   Paul-Emmanuel Brun, Guillemette Massot
        University of Grenoble Alpes, CNRS, VERIMAG F-38000                                      Airbus CyberSecurity SAS
                           Grenoble, France                                                          Elancourt, France
                {name.surname}@univ-grenoble-alpes.fr                                           {name.surname}@airbus.com

                                Miquel Cantero
                           Robotnik Automation S.L.L
                               Valencia, Spain
                             mcantero@robotnik.es



   Abstract—Security is one of the crucial challenges in the design           ever, these methods are generic, and they do not consider the
and development of IoT applications. This paper presents an                   complexity and the dynamic of IoT systems.
approach that focuses on existing security standards to evaluate                 In this work, we present a new approach that considers
and analyse the potential risks faced by IoT systems. It begins by
identifying system assets and their associated vulnerabilities and            existing methodologies and standards for risk assessment in
threats. A list of security objectives and technical requirements             IoT systems. It starts by identifying the assets that should be
are then defined to mitigate the risks and build a secure and                 protected and evaluating the threats they face. Then, a list of
safe system. We use our approach to assess risks in the robotic               security objectives and requirements are defined to defend the
system for supporting the movement of loads in a warehouse.                   system against potential threats. We apply our approach to the
   Index Terms—Security Risk Assessment, IoT, Threats, Security
Requirements.
                                                                              collaborative robots system. Our approach is different from
                                                                              all the generic approaches mentioned above and presented in
                                                                              Section II. It is dedicated to IoT systems and takes into account
                         I. I NTRODUCTION                                     the relevant domain model and standards, as well as the need
                                                                              for evolution of these systems.
   Internet of Things (IoT) is a promising technology that                       This paper is organized as follows: Section II presents the
offers significant improvements to various domains such as                    main approaches and standards for security assessment. We
health, commerce, construction, buildings management, en-                     give an overview of our risk assessment approach in section
ergy, and transport. It reduces management costs, automates                   III, then we describe its different stages and apply them to
the monitoring of infrastructures and equipment, saves energy,                our case study in sections IV to VI. Finally, we give our
and more. An IoT system consists of a network of smart                        conclusions in Section VII.
devices that collaborate with users to accomplish intelligent
services. It generally groups a large number of devices that                                        II. S TATE OF THE ART
interact using multiple communication technologies and pro-
                                                                                We first present the main security standards, then the
tocols.
                                                                              existing methods for risk assessment.
   In the last decade, IoT systems are increasingly susceptible
to various security issues, such as malicious access to services              A. Security Standards
and network attacks. These problems have caused considerable
damage and affected the secrecy, integrity, and availability                     Security standards guide an organization in best security
of information. There are several surveys, such as [1]–[4],                   practices in order to enforce a common level of security by en-
that discuss vulnerabilities that can be exploited by attackers               suring availability, integrity, and confidentiality requirements.
to damage IoT systems. Taking into account these risks and                    Many countries and organizations have established standards
their possible consequences constitute one of the principal                   for risk assessment and analysis. In this section, we briefly
challenges for the designer and developer of these systems.                   present the relevant common and IoT security standards.
   Security Risk Assessment (SRA) is the process that aims                     (a) Common Standards
to identify the most critical threats and provide the required                      • ISO/IEC 27002 [10]: International standard that gives
measures to avoid these threats. It aims to mitigate the risks                        general guidance on the commonly accepted goals of
and build a secure system while covering its vulnerabilities.                         information security management. It describes general
Several SRA methodologies [5]–[9] have been proposed to                               principles structured around 36 security objectives and
evaluate risks and enforce a common level of security. How-                           133 controls.



Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).

                                                                          3
    •  AS/NZS 4360 [11]: The joint Australian/New Zealand                      – Y.2075 specifies the security capabilities of EHM
       risk management standard that provides a generic                          (e-health monitoring) with IoT.
       framework for identifying, analysing, evaluating, treat-                – Y.4112/Y.2077 specifies the concept, purpose, and
       ing, monitoring, and communicating risk.                                  components of plug and play (PnP) capability of
    • ISO/IEC 27005 [12]: International standard that pro-                       the IoT, including security-related requirements.
       vides guidelines for managing information security                      – Y.4553 specifies the requirements of the smart-
       risks in an organization. The standard describes the risk                 phone as a sink node for IoT applications, including
       management process, which includes context establish-                     authentication and data protection capabilities.
       ment, risk assessment, risk treatment, risk acceptance,                 – Y.4702 provides common requirements and ca-
       risk communication, and risk monitoring and review.                       pabilities of device management (DM) in IoT,
    • BS7799 (ISO17799) [13]: British Standard (Code                             including security management capabilities such
       of Practice for Information Security Management),                         as security event detection and reporting, device
       evolved into ISO17799 (The Information Security                           security assurance, and device security control.
       Standard). It gives a basis guide for risk assessment                • ISO/IEC standards: ISO/IEC 30128 [18] covers IoT
       and information security management.                                   security related to sensor network application interface.
    • NIST SP 800-30 [14]: Special Publications Risk Man-
       agement Guide for Information Technology Systems                     Among regional standards, ETSI (standards organization
       standard that provides practitioners with practical guid-            in the telecommunication industry in Europe) recently
       ance for carrying out each of the three steps in the risk            provided “ETSI TS103645” [19] (Cyber Security for
       assessment process (i.e., prepare for the assessment,                Consumer Internet of Thing) standard that gives security
       conduct the assessment, and maintain the assessment).                practices for consumer devices connected to the Internet.
       It also discusses how organizational risk management
       processes complement and inform each other.                          According to [17], most of the IoT security standards
    • NIST SP 800-82 [15]: This standard guides on im-                      presented above are just specification-level standards and
       proving security in Industrial Control Systems (ICS),                a few of them are involved in availability and non-
       including Supervisory Control and Data Acquisi-                      repudiation.
       tion (SCADA) systems, Distributed Control Systems
       (DCS), and other control system configurations such             B. Risk Assessment Methods
       as Programmable Logic Controllers (PLC).
    • IEEE 1686 [16]: Standard for Intelligent Electronic                 EBIOS [9] is used for the assessment and treatment of
       Devices Cyber Security Capabilities’ that defines func-         risks associated with an Information System (IS). Its steps are:
       tions and features to be provided in Intelligent Elec-          definition of the context, identification and estimation of the
       tronic Devices (IEDs). The document addresses access,           security needs and eventual sources of threats, identification
       operation, configuration, firmware revision, and data           and analysis of threat scenarios, and finally specification
       retrieval of an IED.                                            of security objectives and measures to be implemented for
(b) IoT Security Standards                                             risk treatment. The goal of the EBIOS method is to create
    The authors in [17] analyse the existing regional and              a common ground for security discussion between various
    international standards for IoT security and indicate their        stakeholders in order to support management-level decision-
    limitations. Among international standards:                        making. One of the main strengths of the EBIOS approach is
                         1                                             its modularity; its knowledge bases can be tuned to comply
    • ITU-T standards :
                                                                       with local standards and best practices, and to include external
         – Y.2060 provides reference models of IoT and shows           repositories of attack methods, entities or vulnerabilities [20].
           generic security capabilities on every layer.                  CRAMM [7] (CCTA Risk Analysis and Management
         – Y.2063 covers the authorization of heterogeneous            Method) is a qualitative risk assessment methodology that
           devices of WoT.                                             consists of the following steps: collection of data and definition
         – Y.2066 defines common requirements of IoT and               of objectives, identification and evaluation of system assets,
           also security and privacy protection requirements           threat and vulnerability assessment, and finally determining
           related to all the IoT actors.                              countermeasures.
         – Y.2067 covers gateway security mechanisms in-
                                                                          AURUM [5] (Automated Risk and Utility Management)
           cluding authentication, data encryption, privacy
                                                                       supports the NIST SP 800-30 standard [14]. It consists of
           protection, etc.
                                                                       the following steps: identification of risks and their impacts,
         – Y.2068 defines concepts of functional framework
                                                                       implementation of adequate countermeasures, and evaluation
           and capabilities of IoT, including service provision
                                                                       of the impact of countermeasures.
           security, security integration, security audit, etc.
                                                                          CORAS [6] allows risk assessment, documentation of in-
                                                                       termediate results, and presentation of conclusions. The main
 1 https://www.itu.int/en/ITU-T/Pages/default.aspx                     steps of the methodology are: definition of security goals,




                                                                   4
description of threats, risk estimation by giving likelihood
values for identified unwanted incidents, and risk treatment.
    MEHARI [8] (MEthod for Harmonized Analysis of RIsk)
aims to provide a risk management model compliant to ISO-
27005 [12]. The steps of MEHARI are: establishment of the
organization context, identification and classification of assets,
identification and analysis of risks, and finally quantification
and management of risks. MEHARI allows the analysis of the
security stakes and the preliminary classification of the IS en-
tities according to three basic security criteria (confidentiality,
integrity, and availability).
    OCTAVE [21] (Operationally Critical Threat, Asset, and
Vulnerability Evaluation) method allows to define a risk-
based strategic assessment and planning technique for system
security. It is based on process broken into three phases
: development of initial security strategies, identification of
infrastructure vulnerabilities, and development of final security
strategy and plans.
    IT-Grundschutz [22] provides methods, processes, proce-
dures, and measures to establish a system for information
security management. It describes a two-tier risk assessment:
one is designed for reaching a standard level of security, while
a second supplementary risk analysis can be undertaken by
companies that desire an approach customized to their specific
needs or sector or that have special security requirements.                            Fig. 1. IoT Risk Assessment Methodology.
IT-Grundschutz also provides lists of relevant threats and
required countermeasures that can be adapted to the needs
of an organization.                                                          Our approach is iterative, and security requirements can be
                                                                          revised after the system assets have been refined. The results
         III. A N OUTLINE OF OUR M ETHODOLOGY                             of each step should be checked with the customer.
                                                                             In this work, we apply our method to the service robotics
  Starting from standards and methods presented in the pre-               system. As shown in Figure 2, our system consists of a fleet
vious section, we define the risk assessment methodology                  of robots installed in a warehouse to support the movement of
depicted in Figure 1.                                                     different loads.
  Our method consists of four steps:
 1) The first step identifies the assets based on the IoT domain
    model.
 2) The second step specifies threats on the assets based on
    common threats database proposed by the risk assess-
    ment methods presented in Section II. In this work, we
    consider EBIOS database [9], which is compatible with
    all relevant ISO standards and provides a complete list
    of possible threats (42 threats) relative to information
    systems. EBIOS threats database is widely used in risk
                                                                                            Fig. 2. Service Robotics System.
    assessment. Some works like [23] have used it for risk
    analysis of IoT systems.
 3) In the third step, security objectives are derived from the              The flow of these loads does not require any operator to
    threats. In this step, we extract relevant objectives (13             command the fleet. Robots are expected to empty continuously
    objectives) for IoT systems from ISO-27002 [10] that                  an “unload area” where different loads are put together. At
    provides a set of generic security objectives supported by            some point, the system needs to identify the different items
    a set of controls that are an important part of information           and then asks a specific robot to pick it and place it in a
    security management.                                                  specific storage area following some predefined rules. It is also
 4) In the last step, security requirements are built in order            foreseen that in order to perform such activity, the system will
    to implement the security objectives and provide coun-                need to actuate IoT devices, for example, an automated door
    termeasures of the identified threats.                                in the middle of the robot’s path to “storage areas”.




                                                                      5
               IV. I DENTIFICATION OF ASSETS
   ISO-27001 [24] defines an asset as “any tangible or intangi-
ble thing or characteristic that has value to an organization”.
In our approach, we refer to IoT domain model proposed by
[25] to facilitate the identification of the system assets. In this
model, the main concepts are: thing, device, user and resource.
   As shown in Figure 3, Thing is the combination of PE
(Physical Entity) together with its digital representation VE
(Virtual Entity).




                                                                                                 Fig. 4. IoT Devices.


                                                                                Asset ID                Asset Description
                                                                                   A1      Mobile Robot: Embedded Computer
                        Fig. 3. IoT Things.
                                                                                   A2      Mobile Robot: Motion Control (motor driver)
   VE can be of both types:                                                        A3      Mobile Robot: Sensor 1, RGBD Camera
    • Passive Digital Artefact (PDA): a digital representation
                                                                                   A4      Mobile Robot: Sensor 2, Lidar
      of PE stored in a database or similar form.
                                                                                   A5      Mobile Robot: Sensor 3, Odometry
    • Active Digital Artefact (ADA): any type of active code or
      software program usually be some sort of software agent                      A6      Mobile Robot: Lift Mechanism
      or embedded application.                                                     A7      Mobile Robot: Battery (LiFePo)
   Device is a hardware with computing and network capabil-                        A8      Mobile Robot: Network (Card)
ities that allows to monitor or interact with PE. As shown in                      A9      System: User Computer
Figure 4, device can be:
                                                                                  A10      System: Network (Router and infrastructure)
    • Sensor : allows to monitor PE.
    • Actuator : allows to act on PE.                                             A11      System: Mission Command (Outwards)
    • Tag : allows to identify PE and can be read by sensors.                     A12      System: Robot State (Inwards)
   User represents who interacts with PE physically or through                    A13      Door PLC
software interfaces. Users can either be humans or ADA.                           A14      PLC WiFi Gateway
   Resource is software components that can provide infor-
                                                                                  A15      PLC: Opening order (Inwards)
mation about PE, allow the execution of actuation tasks, or
analyse data provided by multiple sensors. Resources may be                       A16      Operator HMI
hosted on a Device, or they could be hosted anywhere in the                                          TABLE I
                                                                                              ROBOTS S YSTEM A SSETS .
network.
   Table I presents examples of 16 assets identified in our case
study. The system includes different types of devices, such as
sensors (e.g., A3, A4, A5) and actuators (e.g., A13, A14, A15).           the EBIOS knowledge bases, threats are classified into eight
 V. I DENTIFICATION OF THREATS AND VULNERABILITIES                        main categories:
   ISO-27001 [24] defines a threat as “a potential cause of an              • Physical damage: T-1010 to T-1050.
unwanted incident, which may result in harm to a system or                  • Natural events : T-2010 to T-2050.
organization” and considers vulnerability as “weakness that                 • Loss of essential services : T-3010 to T-3030.
is related to the organizations’ assets, which sometimes could              • Disturbance due to radiation : T-4010 to T-4030.
cause an unexpected incident”.                                              • Compromise of information : T-5010 to T-5110.
   As mentioned in Section III, our method considers a list of              • Technical failures : T-6010 to T-6050.
generic threats from EBIOS database. In Table II taken from                 • Unauthorized actions : T-7010 to T-7050.




                                                                      6
  ID     Threats Description      A1   A2   A3   A4   A5     A6       A7   A8    A9   A10   A11   A12   A13   A14   A15   A16
T-1010   Fire                     X    X    X    X    X      X        X    X     X    X                 X     X
T-1020   Water damage             X    X    X    X    X      X        X    X     X    X                 X     X
T-1030   Pollution                X    X    X    X    X      X        X    X     X    X                 X     X
T-1040   Major Accident           X    X    X    X    X      X        X    X     X    X                 X     X
T-1050   Destruction of equip-    X    X    X    X    X      X        X    X     X    X                 X     X
         ment or media
T-2010   Climatic                 X    X    X    X    X      X        X    X     X    X                 X     X
         Phenomenon
T-2020   Seismic                  X    X    X    X    X      X        X    X     X    X                 X     X
         Phenomenon
T-2030   Volcanic                 X    X    X    X    X      X        X    X     X    X                 X     X
         Phenomenon
T-2040   Meteorological Phe-      X    X    X    X    X      X        X    X     X    X                 X     X
         nomenon
T-2050   Flood                    X    X    X    X    X      X        X    X     X    X                 X     X
T-3010   Failure      of   air-   X    X                                         X                      X
         conditioning
T-3020   Loss of power sup-       X    X    X    X    X      X        X    X     X    X                 X     X
         ply
T-3030   Failure            of    X                                        X          X     X     X           X     X     X
         telecommunication
         equipment
T-4010   Electromagnetic ra-                                               X          X     X     X           X     X     X
         diation
T-4020   thermal radiation        X    X    X    X    X      X        X    X     X    X                 X     X
T-4030   Electromagnetic          X    X    X    X    X      X        X    X     X    X                 X     X
         pulses
T-5010   Interception       of                                                        X     X     X           X     X     X
         compromising
         interference signals
T-5020   remote spying                      X                                                                             X
T-5030   eavesdropping            X                                        X          X     X     X           X     X
T-5040   Theft of media or                                                                              X     X
         documents
T-5050   Theft of Equipment       X    X    X    X    X      X        X    X     X    X                 X     X
T-5060   Retrieval or recycled                                                                                            X
         or discarded media
T-5070   disclosure                                                                                                       X
T-5080   data from untrust-       X                                                               X                       X
         worthy sources
T-5090   Tampering        with    X    X    X    X    X      X        X    X     X    X                 X     X
         hardware
T-5100   Tampering with soft-     X    X                                         X          X           X     X     X     X
         ware
T-5110   Position detection                      X    X
T-6010   Equipment failure        X    X    X    X    X      X        X    X     X    X                 X     X
T-6020   Equipment malfunc-       X    X    X    X    X      X        X    X     X    X                 X     X
         tion
T-6030   Saturation of the in-    X                                                                                 X     X
         formation system
T-6040   Software                 X                                              X                                        X
         malfunction
T-6050   Breach of informa-       X                                              X                      X                 X
         tion system main-
         tainability
T-7010   Unauthorised use or      X                                              X                                        X
         equipment
T-7020   Fraudulent copying       X                                              X                      X                 X
         of software
T-7030   use of counterfeit or    X                                              X                      X                 X
         copied software
T-7040   corruption of data       X                                        X     X    X                 X     X           X
T-7050   Illegal processing of    X         X                              X     X    X                 X     X           X
         data
T-8010   Error in use             X                                        X     X    X                 X     X           X
T-8020   Abuse of rights          X                                        X     X    X                 X     X           X
T-8030   Forging of rights        X                                        X     X    X                 X     X           X
T-8040   Denial of actions        X                                              X                      X                 X
T-8050   Breach of personnel      X                                              X                      X                 X
         availability
                                                             TABLE II
                                                      T HREAT-A SSET M ATRIX .




                                                                  7
• Compromise of functions :T-8010 to T-8050.                             presented in Table I.
The threat factors can be divided into two categories:
• Environment factors such as earthquakes or floods, cannot
                                                                             VI. S PECIFICATION OF SECURITY OBJECTIVES AND
                                                                                                     REQUIREMENTS
  be avoided. The risk manager should always consider
  environment threats according to their operating environ-                 In this step, we based on ISO-27002 [10] generic list
  ment, even if it is difficult to consider them.                        to specify security objectives needed to protect the system
• Human factors, which are more of our concern because                   assets against the identified threats. We also map each security
  they are vagrant regarding different people and different              objective with the threat list. Table III gives an example
  situations, and it is more difficult to predict human behav-           of security objectives that cover the most potential threats
  ior than regular natural disasters. We distinguish persons             presented in the previous step.
  who belong to the organization like different users of the                After the specification of security objectives, we define
  system and persons from outside the organization such                  security requirements. In Table IV, each security objective
  as recipient, provider, and competitor.                                from Table III leads to the implementation of one or more
In Table II, we show the threats associated to each asset                technical requirements.

             ID          Security Objective                           Security Objective Description                       Threats
            O1010   Protection Against Malicious      Prevent and detect the allocation of any malicious code, as well     T-50xx
                    Code                              as connections of any unprivileged user to the robot network
                                                                                                                           T-10XX
            O1020   Backup                            The data from the initial robot setup and the robot firmware
                                                      require regular backup                                               T-20XX
                                                                                                                           T-5030
                                                                                                                           T-5090
            O1030   Network               Security    Protect the information and communication in network from a          T-7010
                    Management                        client to robot. Sending REST Command once authenticated in          T-7020
                                                      the same network can modify the operations                           T-7040
                                                                                                                           T-5070
            O1040   Exchange of information           Secure the interaction between the platform and robot system
                                                                                                                           T-5080
                                                                                                                           T-5030
                                                                                                                           T-5040
            O1050   Monitoring                        Logs and robot system state shall be secured to prevent a bad        T-60xx
                                                      usage (i.e. a door opened)                                           T-70xx
                                                                                                                           T-80xx
                                                                                                                           T-7010
                                                                                                                           T-7020
            O2010   User Access Management            Authentication and authorization of the robot and any user or        T-7040
                                                      system accessing the robot                                           T-8020
                                                                                                                           T-8030
                                                                                                                           T-6030
            O2020   Network Access Control            Prevent unauthorized use of robot network services
                                                                                                                           T-70xx
                                                                                                                           T-8020
            O2030   Operating    System      Access   Rely on the access control mechanism offered by Ubuntu               T-8030
                    Control                                                                                                T-8040
            O3010   Correct processing in applica-    Check any command received by the robot and the processing           T-60xx
                    tions                             status of the robot. No robot shall accept commands out of reach
                                                      by itself
                                                                                                                           T-8020
            O3020   Cryptographic controls            Protect the sensible information in the robot network and also the
                                                      authentication operations of the users or systems accessing the      T-8030
                                                      robot
            O3030   Security of system files          Rely on the security mechanisms and limitation rules offered by      T-8020
                                                      Ubuntu to protect the system files
                                                                                                                           T-6040
                                                                                                                           T-6050
            O3040   Security in Development and       Control of information flow and integrity in robot systems
                    support process                                                                                        T-8040
                                                                                                                           T-8050
                                                                                                                           T-6020
            O3050   Technical vulnerability man-     Detect and deal with the technical vulnerabilities to reduce the
                    agement                          risks such as physical interfacing of robots.                         T-6040
                                                                TABLE III
                                          S ECURITY O BJECTIVES OF S ERVICE ROBOTICS S YSTEM




                                                                     8
              Objective ID   Requirement ID                              Requirements Description
                             R-1010-0010      REST API must detect malformed commands
                             R-1010-0020      Access to the REST API must be authenticated
              O-1010
                             R-1010-0030      Robot firewall should block all the connection except SSH
                             R-1010-0040      SSH connection should be restricted to unprivileged users
              O-1020         R-1020-0010      Robot firmware should be stored in a non-erasable memory
                             R-1030-0010      Network access must require authentication
              O-1030
                             R-1030-0020      Network communication from a client with a robot must be authenticated and
                                              encrypted
              O-1040         R-1040-0010      Communication from platform to robot must be authenticated and encrypted (e.g:
                                              using protocol like TLS1.2 minimum)
              O-1050         R-1050-0010      Access to log information must be limited to authorized person only
                             R-2010-0010      System account management (right, password, creation, deletion, ...) should be
              O-2010                          done in a central application (to avoid account / password duplication and error in
                                              duplicated right management system)
                             R-2010-0020      User (or technical account) password should be at least 12 characters, with at least
                                              one upper case, lower case, number and special character)
              O-2020         R-2020-0010      Network equipment should implement network access control (e.g: 802.1.X)
                             R-2030-0010      Sudo account should be blocked
              O-2030
                             R-2030-0020      Sudoers rules should be set up according to the system privileged action to perform
                             R-3010-0010      Commands received by the robot should be parsed and checked using whitelist
              O-3010                          approach
                             R-3010-0020      The robot should monitor its processing status (to avoid overprocessing)
                             R-3020-0010      Authentication operation should be performed using cryptographic signature (at
              O-3020                          least SHA256 combined with RSA or ECC algorithms)
                             R-3020-0020      Operating system integrity should be guarantee using cryptographic proof (signa-
                                              ture) securely stored (e.g: TPM)
                             R-3030-0010      File systems access must be limited to authenticated and allowed users (or technical
              O-3030                          account)
                             R-3030-0020      File systems should be encrypted
                             R-3040-0010      Source code and binaries should be signed to ensure their integrity
              O-3040
                             R-3040-0020      Binaries compilation should be done using hardening arguments (memory random-
                                              ization, . . . )
                             R-3050-0010      Software vulnerability should be managed
              O-3050
                             R-3050-0020      Outdated packaged should be upgradable
                                                            TABLE IV
                                       S ECURITY R EQUIREMENTS OF S ERVICE ROBOTICS S YSTEM




                       VII. C ONCLUSION                                security objectives extracted from a common database. All the
                                                                       steps of our approach was understandable and easy to follow
   In this paper, we have tackled the highly vast subject of IoT
                                                                       by the case study owners and several threats related to the
systems security while concentrating on risk assessment. The
                                                                       target infrastructure not previously considered were discovered
proposed approach provides several advantages, including:
                                                                       in this study.
   • It considers IoT domain model to identify all system
      assets.                                                             In the analysis performed in this paper, we have taken
   • It follows relevant security standards to define security         into account all system assets and a complete list of possible
      requirements.                                                    threats taken from the standards, which allows us to identify all
   • It is an iterative approach and responds to the need for          potential risks and the requirements needed to mitigate those
      evolution of IoT systems.                                        risks.
   We have applied this methodology to a robotic system that             After the specification of security requirements, appropriate
supports the movement of loads in the warehouse. We started            countermeasures can be deployed to protect the system against
by identifying the critical assets and the potential threats           the identified risks. There are also approaches such as [26] that
that might compromise them. Then, we defined the technical             helps security experts to determinate impactful and adequate
requirements considering the identified threats and a list of          countermeasures considering organization defense budget.




                                                                   9
   In future work, we plan to apply our method to other                               [20] European Network and Information Security Agency, Inventory of
systems. We also plan to support our approach with a tool                                  risk management/ risk assessment methods, 2013. [Online]. Avail-
                                                                                           able: https://www.enisa.europa.eu/topics/threat-risk-management/risk-
that automates the various analysis activities.                                            management/current-risk/risk-management-inventory/rm-ra-methods
                                                                                      [21] C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, “Opera-
                         ACKNOWLEDGMENT                                                    tionally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
                                                                                           Framework, Version 1.0,” 6 1999.
   The research leading to these results has received funding                         [22] Federal Office for Information Security . (2005) IT Grundschutz.
                                                                                           [Online]. Available: http://www.bsi.de/gshb/
from the European Union through the BRAIN-IoT project                                 [23] B. F. Zahra and B. Abdelhamid, “Risk analysis in Internet of things
H2020-EU.2.1.1. Grant agreement ID: 780089.                                                using EBIOS,” in 2017 IEEE 7th Annual Computing and Communication
                                                                                           Workshop and Conference (CCWC). IEEE, 2017, pp. 1–7.
                                                                                      [24] ISO/IEC 27001:2013. (2013) Information technology — Security tech-
                              R EFERENCES                                                  niques — Information security management systems — Requirements.
                                                                                           [Online]. Available: https://www.iso.org/standard/54534.html
 [1] S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security,              [25] S. Haller, A. Serbanati, M. Bauer, and F. Carrez, “A Domain Model
     privacy and trust in Internet of Things: The road ahead,” Computer                    for the Internet of Things,” in 2013 IEEE International Conference on
     Networks, vol. 76, pp. 146–164, Jan. 2015.                                            Green Computing and Communications and IEEE Internet of Things
 [2] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey                    and IEEE Cyber, Physical and Social Computing, 2013, pp. 411–417.
     on Internet of Things: Architecture, Enabling Technologies, Security             [26] S. Chehida, A. Baouya, M. Bozga, and S. Bensalem, “Exploration of
     and Privacy, and Applications,” IEEE Internet of Things Journal, vol. 4,              impactful countermeasures on iot attacks,” in 2020 9th Mediterranean
     no. 5, pp. 1125–1142, Oct. 2017.                                                      Conference on Embedded Computing (MECO), 2020.
 [3] J. Sengupta, S. Ruj, and S. Das Bit, “A Comprehensive Survey on
     Attacks, Security Issues and Blockchain Solutions for IoT and IIoT,”
     Journal of Network and Computer Applications, vol. 149, p. 102481,
     Jan. 2020.
 [4] P. I. Radoglou Grammatikis, P. G. Sarigiannidis, and I. D. Moscholios,
     “Securing the Internet of Things: Challenges, threats and solutions,”
     Internet of Things, vol. 5, pp. 41–70, Mar. 2019.
 [5] A. Ekelhart, S. Fenz, and T. Neubauer, “Aurum: A framework for infor-
     mation security risk management,” in 2009 42nd Hawaii International
     Conference on System Sciences, 2009, pp. 1–10.
 [6] F. den Braber, I. Hogganvik, M. S. Lund, K. Stølen, and F. Vraalsen,
     “Model-based security analysis in seven steps — a guided tour to the
     CORAS method,” BT Technology Journal, vol. 25, no. 1, pp. 101–117,
     Jan. 2007. [Online]. Available: http://link.springer.com/10.1007/s10550-
     007-0013-9
 [7] Z. Yazar, “A qualitative risk analysis and management tool–CRAMM,”
     SANS InfoSec Reading Room White Paper, vol. 11, pp. 12–32, 2002.
 [8] “MEHARI: MEthod for Harmonized Analysis of RIsk,” 2010. [Online].
     Available: https://en.wikipedia.org/wiki/MEHARI
 [9] The National Cybersecurity Agency of France (ANSSI), EBIOS
     2010 - Expression of Needs and Identifiation of Security objectives.,
     2010. [Online]. Available: https://www.ssi.gouv.fr/guide/ebios-2010-
     expression-des-besoins-et-identification-des-objectifs-de-securite/
[10] ISO/IEC 27002:2013. (2013) Information technology — Security
     techniques — Code of practice for information security controls.
     [Online]. Available: https://www.iso.org/standard/54533.html
[11] AS/NZS        4360-2004.       (2004)     Risk      management.     [On-
     line]. Available: https://www.standards.org.au/standards-catalogue/sa-
     snz/publicsafety/ob-007/as-slash-nzs–4360-2004
[12] ISO/IEC 27005:2011. (2011) Information technology — Security
     techniques — Information security risk management. [Online].
     Available: https://www.iso.org/standard/56742.html
[13] ISO/IEC 17799:2005. (2005) Information technology — Security
     techniques — Code of practice for information security management.
     [Online]. Available: https://www.iso.org/standard/39612.html
[14] G. Stoneburner, A. Goguen, and A. Feringa, “Risk management guide
     for information technology systems,” Nist special publication, vol. 800,
     no. 30, pp. 800–30, 2002.
[15] K. Stouffer, J. Falco, and K. Scarfone, “Nist special publication 800-
     82, guide to industrial control systems (ics) security,” NIST Special
     Publication, pp. 800–882, 01 2011.
[16] IEEE 1686. (2013) IEEE Standard for Intelligent Electronic
     Devices      Cyber     Security    Capabilities.   [Online].   Available:
     https://standards.ieee.org/standard/1686-2013.html
[17] I. Hwang and Y. Kim, “Analysis of Security Standardization for the
     Internet of Things,” in 2017 International Conference on Platform
     Technology and Service (PlatCon), 2017, pp. 1–6.
[18] ISO/IEC 30128:2014. (2014) Information technology — Sensor
     networks — Generic Sensor Network Application Interface . [Online].
     Available: https://www.iso.org/standard/53248.html
[19] ETSI TS 103 645. (2019) Cyber Security for Consumer Internet of
     Things .




                                                                                 10