TecnoLógicas (Apr 2024)

Semiotics: An Approach to Model Security Scenarios for IoT-Based Agriculture Software

  • Julio Ariel Hurtado,
  • Leandro Antonelli,
  • Santiago López,
  • Adriana Gómez,
  • Juliana Delle Ville,
  • Giuliana Maltempo,
  • Frey Giovanny Zambrano,
  • Andrés Solis,
  • Marta Cecilia Camacho,
  • Miguel Solinas,
  • Gladys Kaplan,
  • Freddy Muñoz

DOI
https://doi.org/10.22430/22565337.2923
Journal volume & issue
Vol. 27, no. 59
pp. e2923 – e2923

Abstract

Read online

Agriculture is a vital human activity that contributes to sustainable development. A few decades ago, the agricultural sector adopted the Internet of Things (IoT), which has played a relevant role in precision and smart farming. The IoT developments in agriculture require that numerous connected devices work cooperatively. This increases the vulnerability of IoT devices, mainly because they lack the necessary built-in security because of their context and computational capacity. Other security threats to these devices are related to data storage and processing connected to edge or cloud servers. To ensure that IoT-based solutions meet functional and non-functional requirements, particularly those concerning security, software companies should adopt a security-focused approach to their software requirements specification. This paper proposes a method for specifying security scenarios, integrating requirements and architecture viewpoints into the context of IoT for agricultural solutions. The method comprises four steps: (i) describe scenarios for the intended software, (ii) describe scenarios with incorrect uses of the system, (iii) translate these scenarios into security scenarios using a set of rules, and (iv) improve the security scenarios. This paper also describes a prototype application that employs the proposed algorithm to strengthen the incorrect use scenario based on the correct use scenario. Then, the expert can complete the information for the analysis and subsequent derivation of the security scenario. In addition, this paper describes a preliminary validation of our approach. The results show that the proposed approach enables software engineers to define and analyze security scenarios in the IoT and agricultural contexts with good results. A survey administered to five security experts found that the proposed security scenario method is generally useful for specifying agricultural IoT solutions but needs improvement in different areas.

Keywords