Security Requirements Engineering in medical IoT: comparing literature and developers’ practices

Master Thesis (2017)
Author(s)

A.A. Guerra Veloz (TU Delft - Technology, Policy and Management)

Contributor(s)

W. Pieters – Mentor

GA de Reuver – Graduation committee member

S. Roeser – Graduation committee member

L.V.E. Fichtner – Graduation committee member

Faculty
Technology, Policy and Management
Copyright
© 2017 Ana Guerra Veloz
More Info
expand_more
Publication Year
2017
Language
English
Copyright
© 2017 Ana Guerra Veloz
Graduation Date
24-08-2017
Awarding Institution
Delft University of Technology
Programme
['Management of Technology (MoT)']
Faculty
Technology, Policy and Management
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In the Internet of Things paradigm, everyday objects communicate with each other to form a worldwide dynamic network which provides opportunities for innovative services and applications in almost every field. Nevertheless, such a dynamic network also brings serious security issues to users, society, and even to the internet. Things that lack of basic security requirements turn out to be an attractive target for hackers and a doorway into the information technologies’ infrastructure and personal data. To reduce the impact of security failures and take advantage of the growing opportunities that the IoT brings to users and businesses, a secure development of the IoT must be encouraged. A secure system development can be achieved by disseminating knowledge of security and development among academy and industry. However, it seems that there is a gap between developers’ management of requirements and security requirements frameworks and methods. Based on a qualitative study, we collect data on developers’ practices to handle security requirements of IoT medical applications, and the context of development. Developers’ practices to manage security requirements are compared with recommended practices of the security requirements engineering field. Besides, factors that influence developer’s practices are identified. The results show that small companies do not have a distinctive process to handle security requirements. Moreover, practices, as described by the field of security requirements engineering, are partially adopted. Differences occur because of incorrect assumptions regarding developers’ motivations to address security, methods that do not match development approaches, and the dynamic nature of security. This research contributes to the security field by providing insights on how developers perceptions and practices to handle security requirements during the development of IoT medical applications.

Files

Thesis_Final_Version_Ana_Guerr... (pdf)
(pdf | 2.17 Mb)
- Embargo expired in 24-08-2017
License info not available