The Multi-access Edge Computing (MEC) computing model provides on-demand cloud resources and services to the edge of the network, to offer storage and computing capacity, mobility, and context awareness support for emerging Internet of Things (IoT) applications. On the other hand, its complex hierarchical model introduces new vulnerabilities, which can influence the security of IoT applications. The use of different enabling technologies at the edge of the network, such as various wireless access and virtualization technologies, implies several threats and challenges that make the security analysis and the deployment of security mechanisms a technically challenging problem. This paper proposes a technique to model Edge-based systems and automatically extract security threats and plan possible security tests. The proposed approach is tested against a simple, but significant case study. The main contribution consists of a threat catalog that can be used to derive a threat model and perform a risk analysis process of specific MEC-based IoT scenarios.

Threat Modeling of Edge-Based IoT Applications / Ficco, Massimo; Granata, Daniele; Rak, Massimiliano; Salzillo, Giovanni. - 1439:(2021), pp. 282-296. [10.1007/978-3-030-85347-1_21]

Threat Modeling of Edge-Based IoT Applications

Massimo Ficco;Daniele Granata;Massimiliano Rak;
2021

Abstract

The Multi-access Edge Computing (MEC) computing model provides on-demand cloud resources and services to the edge of the network, to offer storage and computing capacity, mobility, and context awareness support for emerging Internet of Things (IoT) applications. On the other hand, its complex hierarchical model introduces new vulnerabilities, which can influence the security of IoT applications. The use of different enabling technologies at the edge of the network, such as various wireless access and virtualization technologies, implies several threats and challenges that make the security analysis and the deployment of security mechanisms a technically challenging problem. This paper proposes a technique to model Edge-based systems and automatically extract security threats and plan possible security tests. The proposed approach is tested against a simple, but significant case study. The main contribution consists of a threat catalog that can be used to derive a threat model and perform a risk analysis process of specific MEC-based IoT scenarios.
2021
978-3-030-85346-4
Threat Modeling of Edge-Based IoT Applications / Ficco, Massimo; Granata, Daniele; Rak, Massimiliano; Salzillo, Giovanni. - 1439:(2021), pp. 282-296. [10.1007/978-3-030-85347-1_21]
File in questo prodotto:
File Dimensione Formato  
Threat_Modeling_of_Edge_Based_IoT_Applications-7.pdf

non disponibili

Licenza: Non specificato
Dimensione 334.3 kB
Formato Adobe PDF
334.3 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/986060
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact