Professional Documents
Culture Documents
• Structural patterns are concerned with how classes and objects are composed
to form larger structures.
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 2 BITS-Pilani
Adapter P attern
What problem does it solve:
The interfaces for different kinds of processing are sometimes incompatible and the client
may need a stable common interface for similar components being processed underneath.
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 3 BITS-Pilani
Adapter P attern
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 4 BITS-Pilani
package com.bits.ooad;
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 5 BITS-Pilani
package com.bits.ooad;
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 6 BITS-Pilani
package com.bits.ooad;
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 7 BITS-Pilani
package com.bits.ooad;
@Override
public void unzipFile(String unzipFile) {
if(unzipFile.contains("egg")) {
unzipAdapter = new UnzipAdapter(unzipFile);
unzipAdapter.unzipFile(unzipFile);
} else {
System.out.println("Unzip " + unzipFile + " using 7Zip");
}
}
}
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 8 BITS-Pilani
package com.bits.ooad;
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 9 BITS-Pilani
Need
• UML is the de facto industry standard for modelling, but standard UML diagrams are
ambiguous for domains such as IOT Security.
• There are some Modelling extensions available such as SysML and UMLsec, but they do
not address IOT Security particularly.
• So, there is need of UML modelling extension for IOT Security which the researchers
try to address through this research.
Link: https://ieeexplore.ieee.org/abstract/document/8241333?
casa_token=cvRK0yRZoNsAAAAA:8o9Fnd9mo97ULJYC7Duyo16ycWpBWAO10erwGcjFSgfpk6
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 10 BITS-Pilani
IoTsec: N omenclature
• IoTsec proposes a nomenclature with security concerns within each element. It
comprises 15 elements:
1.) N: Authentication 9.) KM: Key Management
2.) Z: Authorization 10.) IM: Identity Management
3.) C: Cypher 11.) Ps: Pseudonym
4.) D: Decipher 12.) CA: Certification Authority
5.) SS: Secure Storage 13.) RA: Registration Authority
6.) SC: Secure Communication 14.) TP: Tampering Protection
7.) B&B: IoT Broker or Bridge 15.) CC: Custom Control
8.) T&R: Trust and Reputation
• These elements are used inside of the extended UML diagrams because they are high
level abstraction of security requirements.
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 11 BITS-Pilani
IoTsec: Actors Extension
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 12 BITS-Pilani
IoTsec: U se C ase Di agram Extension
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 13 BITS-Pilani
IoTsec: C lass Diagram Extension
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 14 BITS-Pilani
IoTsec: S equence Diagram Extension
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 15 BITS-Pilani
IoTsec: S wimlane Class Diagram
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 16 BITS-Pilani
IoTsec: S tate Di agram E xtensi on
• State diagram depicts the behaviour of an object by specifying every stage in its life.
• Example shows stages of authentication mechanism.
• Nomenclature constraints such as SS and SC are incorporated.
• Stages of N from Created till Authenticated are drawn.
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 17 BITS-Pilani
IoTsec: C ommuni cati on Di agram Extension
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 18 BITS-Pilani
IoTsec: Activi ty Diagram Extension
Note:
Other diagram such as deployment diagrams and component diagrams
which are out of the scope of our course, are not explained.
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 19 BITS-Pilani
IoTsec: C oncl us ion
• Security of IOT systems is a major challenge and a UML modelling extension can enhance
the design of security for a better implementation.
• IoTsec, which is a UML/SysML extension, tries encapsulate security knowledge to model
IoT systems and can prove to be a helpful tool during the designing phase.
• The security nomenclature and constraints defined by IoTsec can further be incorporated
in more real-world problems such as automation of the notation verification, exporting
XMI files,
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 20 BITS-Pilani
THANK YOU
SO OOAD
FTWARE ARC HI TE CTUR ES
- Assignment 21 BITS-Pilani