With respect to the Common Criteria methodology these security de

With respect to the Common Criteria methodology these security design patterns are related to the security functions implemented within the IT product or system according to the security functional requirements. Another kind of security design patterns is discussed in this paper��patterns closely related to the Common Criteria methodology, expressing: assets, legal sellckchem subjects, attackers, threats, Inhibitors,Modulators,Libraries security policies, assumptions and security objectives, used to elaborate the security requirements specification for the IT product or system, and finally, the security functions implemented in the IT product or system. Here discussed ��Common Criteria (CC) related security design patterns��, mentioned briefly in the paper as ��patterns�� or ��design patterns��, are focused on the risk management issues, not on the IT security solutions.

The CC-related patterns concern the design process (called here IT security development), can be used in many projects (i.e., they are reusable), but in a certain context (i.e., in the CC-methodology context). Such patterns can be applied for different kinds of IT products or systems but in the paper only the patterns subset related Inhibitors,Modulators,Libraries to sensors and sensor networks are discussed.The paper focuses on the identification of intelligent sensors common features, allowing us to define a generalized model of such devices and, on this basis, to elaborate CC-related design patterns which can be used to specify security models of intelligent sensors. The discussed patterns concern only two stages of the Common Criteria compliant IT security development but these stages are of key importance: Inhibitors,Modulators,Libraries the security problem definition and its solution.

The paper includes the following sections. Section 2 contains a review of intelligent sensor security issues and sensor applications. Section 3 contains the CC methodology primer for sensor Inhibitors,Modulators,Libraries systems developers not familiar with this methodology. A generalized model of the intelligent sensor allowing to create the CC Batimastat security model for itself is discussed in Section 4. Section 5 presents selected issues of the Common Criteria compliant development process applied to intelligent sensors, focusing on two important issues: specification of the security problem definition and solution. The proposed specification means were elaborated on the basis of a review of the literature included in Section 2.

Section 6 discusses model evaluation. The last section concludes the paper and specifies the planned works.2.?Intelligent Sensors and Their Basic Security IssuesThe progress in low-power CMOS processing, selleck bio communication circuits and transducer technology has enabled new possibilities and applications, including advanced processing within the nodes (��motes��) of wireless sensor networks (WSNs). Apart from a class of sensors working in WSNs, other groups exist in different application domains.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>