2010
DOI: 10.3390/s100100822
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Sensors Security

Abstract: The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
44
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(44 citation statements)
references
References 18 publications
0
44
0
Order By: Relevance
“…More information about the CC methodology can be found in [2], [3]/Section 3 and in the books [6,7]. Table 1 contains the explanation of the terms and acronyms often used in the paper.…”
Section: Common Criteria Compliant It Security Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…More information about the CC methodology can be found in [2], [3]/Section 3 and in the books [6,7]. Table 1 contains the explanation of the terms and acronyms often used in the paper.…”
Section: Common Criteria Compliant It Security Developmentmentioning
confidence: 99%
“…The CC-related design patterns for this emerging domain of the Common Criteria standard application has been elaborated [3,5], and this paper discusses their validation on the intelligent methane sensor for mines.…”
Section: Common Criteria Compliant It Security Developmentmentioning
confidence: 99%
“…The paper concerns generally the information technology (IT) security development methodology compliant with ISO/IEC 15408 Common Criteria (CC) [ 1 , 2 ], but is focused on the implementation of this methodology in intelligent sensors. Earlier papers [ 3 , 4 ] introduced the patterns-based IT security development method and discussed its validation on two different kinds of sensors, i.e ., a mote-based medical sensor remotely monitoring patients and a methane detector working in a coal mine environment. The objective of this paper is to improve the introduced method by using possibilities and advantages offered by the knowledge engineering approach.…”
Section: Introductionmentioning
confidence: 99%
“…One of them, related to the motivation for this paper, is providing intelligent sensor systems developers with methods, tools and knowledge, helping them effectively use the Common Criteria methodology in their R&D works. The provided method is based on the Common Criteria related IT security design patterns developed and validated in [ 3 , 4 ]. The paper shows that these patterns can be implemented in the Protégé Ontology Editor and Knowledge Acquisition System from Stanford University [ 5 ] and demonstrates how to apply these patterns in the IT security development process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation