You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

30 April 2010

Common Criteria Related Security Design Patterns—Validation on the Intelligent Sensor Example Designed for Mine Environment

Institute of Innovative Technologies EMAG, 40-189 Katowice, Leopolda 31, Poland
This article belongs to the Special Issue Intelligent Sensors - 2010

Abstract

The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.

1. Introduction

The paper concerns the intelligent sensor security development methodology compliant with ISO/IEC 15408 Common Criteria (CC) [1]. This standard provides assurance for the designed information technology (IT) product or system. Assurance means that the product or system meets its security objectives. In other words, it means that the implemented measures will be able to counter threats when they occur. The sources of assurance are the rigor applied during development and manufacturing processes, independent third-party evaluations as well as operation and maintenance according to the obtained certificate. These specially developed and evaluated IT products (hardware, software, firmware) and systems can be applied in a higher risk environment. The CC methodology has been broadly used for years. More than a thousand certification processes were completed and the certificates deal with varied products or systems [2].
Generally, sensors are devices that measure a physical quantity and convert it into a signal, which can be read by an observer or instrument. A number of such devices contain actuators. Intelligent sensors are able to process measured values and may be organized in sensor systems. They use network technology for integration, including the wireless one. With respect to the CC methodology, intelligent sensors can be considered as IT products. They have hardware and software components, co-operate with other IT systems and, first and foremost, the IT inherent risks should be considered for them.
The number of intelligent sensors implementations is growing, though the number of finalized Common Criteria certification processes of these IT products is relatively low. The intelligent sensor systems application can be discussed as one of the emerging application domains of the Common Criteria standard.
The motivation of this paper is to provide the developers with knowledge and a set of validated design patterns related to the application of the Common Criteria methodology to the intelligent sensors development. This can help them in a broader use of this methodology in dependable sensor solutions, including sensors designed for the mine environment.
This paper is a continuation of [3], which includes:
  • the primer of the Common Criteria standard designed for sensor systems developers;
  • the review of the author’s earlier researches leading to the elaboration of a CC-based, IT security development method focused on the intelligent sensors and sensor systems;
  • the discussion of architectures, applications and security issues of intelligent sensors and sensor systems; reviewed security works, focused on attack analysis and an advanced security mechanism, do not provide a method of implementation of these mechanisms with the use of assurance methods, for example Common Criteria; this discussion allows to propose two models: a generalized intelligent sensor model and, related to it, CC-compliant intelligent sensor security model;
  • the Common Criteria related security design patterns, elaborated on the basis of the exhaustive analysis of security features and behaviors of different kinds of sensors working within varied operational environments; these patterns can be used to fulfil the security model with contents specific to a given sensor;
  • the validation of this set of patterns on the intelligent medical sensor example elaborated on the basis of the [4] paper.
The elaborated Common Criteria related security design patterns (shortly: “CC-related patterns”) [3] should be validated on varied sensors projects to optimize this set and its particular items. The set should contain necessary and sufficient items to express common security features and behaviors of intelligent sensors in their most representative application domains. Particular items should have a general, universal meaning, allowing their use in a broad range of applications. Thanks to introduced operations on patterns (called “enhanced generics”, explained later), like: refinement, parameterization or iteration, different details can be added to their contents, allowing them to address very specific security issues. To elaborate an adequate, optimized set of patterns, different validations on varied projects are planned. More optimized patterns improve the usability and quality of designs.
The contribution of the paper, related to the [3] contribution, is to provide a CC-compliant, pattern-based IT security development method focused on intelligent sensors.
The objectives of the paper are:
  • to provide a complete, concise description of the pattern-based method,
  • method validation on the example of the intelligent sensor detecting methane in a mine,
  • method improvement based on the validation results.
The indirect, far-reaching objective is to provide such improved, ordered patterns and related knowledge to a broader group of developers of intelligent sensors or sensor systems designed for high risk environments.
The elaboration of CC-related patterns requires validations on varied projects. Currently, two validations are being finalized: the motion sensor of digital tachographs [5] and the medical sensor remotely monitoring patients [3]. This paper presents another project example—the intelligent sensor detecting methane in the coal mine environment.
The paper includes the following key sections. Section 2 provides a general introduction to the Common Criteria IT security development process, presenting the CC methodology background and the author’s researches on the automation of this process. Section 3 reviews the author’s provided CC-compliant method of intelligent sensors security development. The section presents a general sensor model, its security model and a set of predefined Common Criteria related security design patterns to fulfil this security model with contents specific to the elaborated type of the sensor. The central part of the paper is Section 4 which presents a method validation on the intelligent sensor detecting methane. It is shown how the predefined patterns can be applied to work out the intelligent sensor security specification. Section 5 concludes the validation example and summarizes the methodology as a whole.

2. Common Criteria Compliant IT Security Development

The security patterns evaluated here are closely related to the assurance methodology specified in the Common Criteria standard (ISO/IEC 15408). This methodology can be applied to provide dependable IT products or systems for applications, where the assessed, IT inherent risk is significant.
Assurance, measurable in the range EAL1 to EAL7, is identified as the confidence that an IT product or system meets security objectives specified for it. In other words, it means that the built-in security functions related to these objectives and representing measures will work effectively whenever a threat occurs. The source of assurance is rigorous development and independent evaluation, so these IT products or systems are called TOE (target of evaluation). The development encompasses two processes.
The first process, called the IT security development, summarized in the security target (ST) specification includes seven stages [1]/Part 1, but the following five are most relevant:
  • Work-out of the “ST introduction”, containing different identifiers, informal TOE overview and TOE description;
  • Security problem definition (SPD); SPD specified threats, OSPs (organizational security policies) and assumptions for the TOE and its operational environment;
  • Solution of this problem by specifying security objectives (SO)—for the TOE and its operational environment;
  • Work-out of the security functional requirements (SFRs) specification on the security objectives basis, and the set of security assurance requirements (SARs) which are derived mainly from the declared EAL;
  • Creating the TOE summary specification, including the TOE security functions derived from the SFRs; they are implemented in the TOE on the claimed EAL during the TOE development process.
The paper concerns the first three issues and discusses how to specify elaborated TOE on general level, how to specify the security problem and its solution using the predefined CC-related patterns. Please note that the security target for the TOE [1]/Part 1 can be considered as a security model of the developed IT product or system. Here discussed security patterns concern SPD and SO. For security functions some patterns are predefined too, but only briefly mentioned in the paper. Security functional components [1]/Part 2 and security assurance components [1]/Part 3 play a role of patterns for the security requirements (SFRs, SARs).
The second above mentioned development process, called the TOE development process, is responsible for the implementation and documentation of the elaborated security functions (specified in the ST) on the claimed EAL. Evidences deal with:
  • TOE architecture, its functional specification, design, security policy, implementation,
  • life cycle definition, configuration management, product delivery, development process security, used tools and their options,
  • tests specification, test depth and coverage,
  • product manuals and procedures,
  • vulnerability assessment of the TOE and its development site.
The TOE, ST, and related documentation (evidences) are provided for the independent evaluation process, finalized by getting a CC certificate for the IT product or system with respect the claimed EAL [2]. More information about the CC methodology can be found in [2], [3]/Section 3 and in the books [6,7]. Table 1 contains the explanation of the terms and acronyms often used in the paper.
Table 1. Common Criteria related terms and acronyms [1]/Part1.
The paper is related to the author’s more extensive works aiming at the improvement and automation of the CC methodology by introducing a semiformal description, supporting software tools and by using the knowledge engineering methodology, discussed also in [3]. First, a Common Criteria compliant, UML/OCL-based IT security development framework (ITSDF) [79] was elaborated. The framework encompasses:
  • models of data structures and processes of IT security development stages,
  • models of the specification means used for these IT security development stages, including CC components and the author’s defined semiformal enhanced generics.
The introduced enhanced generics play a role of here discussed CC-related design patterns. They are derived from “generics” commonly used by developers, but are more formalized and can be implemented in software tools. An enhanced generic is defined as a mnemonic name expressing common features, behaviors or actions related to the IT security development process, i.e., subjects and other active entities, assets and other passive entities, threats, assumptions, security policies, security objectives, and functions. They are “enhanced” since they are semiformal and have features comparable to CC components, allowing such operations as: parameterization, derivation, iteration, and refinement.
There are about 350 predefined enhanced generics and they can be applied for commonly used IT products or systems, but the intelligent sensors or their systems, as specific IT products, are not represented there. The CC-related design patterns for this emerging domain of the Common Criteria standard application has been elaborated [3,5], and this paper discusses their validation on the intelligent methane sensor for mines.

5. Conclusions

5.1. Validation Summary

The validation of the CC-related design patterns on the MEDIS sensor example shows that most of the identified security issues can be expressed with the use of predefined patterns, though several new items were defined to express specific issues related to the considered domain of application. The following seven patterns are defined as a result of the performed validation:
  • to add to Table 8 as an asset related to the sensor operational environment:
    • DEO.Co-operatEquip. The specialized equipment co-operating with the TOE.
  • to add to Table 13 as OSPs related to the TOE:
    • PSMN.ATEX. Ensure compliance with the ATEX equipment directive 94/9/EC.
    • PSMN.LegalAct. Ensure compliance with mining legal regulations.
  • to add to Table 15 as security objectives concerning mainly the TOE:
    • OINT.IntrinsicSafe. The intelligent sensor should be intrinsically safe.
    • OSMN.ATEX. The IT product should comply with the ATEX equipment directive 94/9/EC.
    • OSMN.LegalAct. The IT product should comply with the national regulations issued by mining authorities.
  • to add to Table 15 as security objectives concerning mainly the site processes:
    • OSMN.ISO27001. Within the sensor development and manufacturing environment the ISMS (Information Security Management System) should be implemented according to ISO/IEC 27001.
During validation all security issues are expressed without changing semantics of predefined enhanced generics. To express very specific issues, the refinement operation on a pattern was enough.

5.2. Method Evaluation and Future Development

The intelligent sensors and network-based software systems which integrate them:
  • are considered as “IT products and systems” with all security issues inherent to them,
  • are used often for high risk applications which require right assurance.
These factors allow discussing the intelligent sensors and sensor systems as a Common Criteria domain of application. This domain has emerging character. The exhaustive review of the state-of-the-art of this domain [3] presents this situation in details.
The paper presents the evaluation of the method supporting the sensor developers in the use of the Common Criteria methodology. The method, based on the motion sensors for digital tachographs project [5] was introduced [3] and evaluated on the intelligent sensor for medical applications. This paper presents a slightly improved version of the method and its validation on another, very specific sensor designed for mining applications.
The general contribution of the paper, related to [3], deals with:
  • defining CC-related security design patterns, called here enhanced generics, to express elementary security problems (i.e., threats, security organizational policies, assumptions), elementary solutions of these problems (i.e., security objectives), and implementation of these solutions (i.e., security functions based on requirements) with respect to the intelligent sensors needs and the life-cycle model,
  • providing knowledge how to apply these patterns to elaborate Common Criteria complaint security models, called security targets, for a broader class of intelligent sensors.
The direct contribution of the paper is concisely presenting, evaluating and improving the proposed patterns-based method and showing how to apply it to one of the emerging domains of application related to mining (early detection of methane hazards).
Generally, this method has open character—new security patterns can be always added, still the author’s experience shows that uncontrolled extension of the existing set of patterns decreases coherency and quality of the elaborated specifications. Instead of defining numerous items, the enhanced generics features are used, like parameterization, refinement and iteration. The quantity of patterns should be necessary and sufficient to describe security features of a given domain of application. To achieve this aim, the method validation on several design examples will be suitable. Each validation means new experience allowing to complete a given set of patterns for an additional kind of sensors as well as to improve quality and preciseness of security specifications provided by the method. These improvements allow applying the knowledge engineering methodology and tools. The next, planned step is to develop an ontology of the CC-related security design patterns and knowledge base supporting the intelligent sensors developers. The initial version of this knowledge base restricted to the motion sensors is presented in [16].
The presented intelligent sensors development patterns-based method is focused on the use of the matured but still improved Common Criteria methodology providing assurance for IT products or systems, including sensor systems. The formalized, rigorous development and independent security evaluation are the basis of this assurance. IT products or systems can get worldwide recognized certificates and can be used in higher risk applications.
Elaborating a Common Criteria compliant method dedicated for the intelligent sensors should become widespread in the secure intelligent sensors applications. The review of this application domain was provided in [3]. The most relevant currently running researches concern:
  • airplane health monitoring systems,
  • safety-critical assets distribution systems,
  • motion sensors of digital tachographs,
  • SCADA (Supervisory Control And Data Acquisition) related products,
  • specialized firewalls used in control and automation systems, co-operating with sensor networks, but the most numerous group of the certified solutions [5,16] concerns digital tachograph applications, e.g., [13]. In the near future new certification processes in this domain are expected because the document [14] has been recently revised. The Common Criteria methodology use allows to avoid shortage related to risk factors in the operational and development environments. First and foremost, threats and vulnerabilities are exhaustively identified and analyzed if they are properly countered. Independent evaluation supports these activities.

References and Notes

  1. Common Criteria for IT Security Evaluation, version 3.1,; 2009. Common Criteria Member Organizations, Part 1–3; http://www.commoncriteriaportal.org/ (accessed on 5 February 2010).
  2. Common Criteria Portal Home page. http://www.commoncriteriaportal.org/ (accessed on 5 February 2010).
  3. Bialas, A. Intelligent Sensors Security. Sensors 2010, 10, 822–859. [Google Scholar]
  4. Malasri, K.; Wang, L. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network. Sensors 2009, 9, 6273–6297. [Google Scholar]
  5. Bialas, A. Security-Related Design Patterns for Intelligent Sensors Requiring Measurable Assurance. Electr. Rev (Przegląd Elektrotechniczny) 2009, 85, 92–99. [Google Scholar]
  6. Hermann, D.S. Using the Common Criteria for IT Security Evaluation; CRC Press: Boca Raton, FL, USA, 2003. [Google Scholar]
  7. Bialas, A. Semiformal Common Criteria Compliant IT Security Development Framework. Stud. Inf; Silesian University of Technology Press Gliwice: Poland, 2008; 29. Available online: http://www.znsi.aei.polsl.pl/ (accessed on 15 September 2009).
  8. Bialas, A. Semiformal Framework for ICT Security Development. Presentation on the 8th International Common Criteria Conference, Rome, Italy, September 25–27, 2007; Available online: http://www.8iccc.com/index.php (accessed on September 2009).
  9. Bialas, A. Semiformal Approach to the IT Security Development. Proceedings of the International Conferences on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), Szklarska Poreba, Poland, June 14–16, 2007; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Washington, DC, USA, 2007; pp. 3–11. [Google Scholar]
  10. Yoshioka, N.; Washizaki, H.; Maruyama, K. A survey on security patterns. Prog. Inf 2008, 5, 35–47. [Google Scholar]
  11. Jürjens, J. Secure Systems Development with UML; Springer-Verlag: Heidelberg, Germany, 2005. [Google Scholar]
  12. Schumacher, M.; Fernandez-Buglioni, E.; Hybertson, D.; Buschmann, F.; Sommerlad, P. Security Patterns: Integrating Security and Systems Engineering; John Wiley and Sons: Chichester, UK, 2006. [Google Scholar]
  13. Security Target IS2000 Smartach SRES, P206412; Actia: Toulouse, France, 2005.
  14. Commission Regulation (EC) No.1360/2002 on Recording Equipment in Road Transport. Annex 1B Requirements for Construction, Testing, Installation and Inspection. Off. J. Eur. Commun 2002, L207, 204–252.
  15. Site Certification. Supporting Document Guidance, Version 1.0 Revision 1 (CCDB-2007-11-001),; October 2007. Available online; http://www.commoncriteriaportal.org/ (accessed on 20 January 2010).
  16. Bialas, A. Ontological Approach to the Motion Sensor Security Development. Electr. Rev (Przegląd Elektrotechniczny) 2009, 85, 36–44. [Google Scholar]
  17. Figaro. General Information for TGS Sensors; Arlington Heights, IL, USA, 2005. Available online: http://www.figarosensor.com/ (accessed on January 2010).
  18. Wise Control. Gas Detectors and Related Equipment; Korea, August 2005. Available online: http://www.wisecontrol.com (accessed January 2010).
  19. EMAG Home page. http://www.emag.pl/ (accessed on 5 February 2010).
  20. Wasilewski, S. Monitoring of Gas Hazards in Polish Underground Hard Coal Mines. Mechanizacja i Automatyzacja Górnictwa 2007, 8, 29–33. [Google Scholar]
  21. Wasilewski, S. Integrated Outburst Detection Sensor—Model Tests. Mechanizacja i Automatyzacja Górnictwa 2009, 8, 51–70. [Google Scholar]
  22. EU Directive 94/9/EC—Equipment and Protective Systems Intended for Use in Potentially Explosive Atmospheres (ATEX) Version 2 2008.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.