<?xml version="1.0" encoding="UTF-8"?><?xml-model type="application/xml-dtd" href="http://jats.nlm.nih.gov/publishing/1.1d3/JATS-journalpublishing1.dtd"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d3 20150301//EN" "http://jats.nlm.nih.gov/publishing/1.1d3/JATS-journalpublishing1.dtd">
<article xmlns:ali="http://www.niso.org/schemas/ali/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" dtd-version="1.1d3" specific-use="Marcalyc 1.2" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="redalyc">3442</journal-id>
<journal-title-group>
<journal-title specific-use="original" xml:lang="es">TecnoLógicas</journal-title>
</journal-title-group>
<issn pub-type="ppub">0123-7799</issn>
<issn pub-type="epub">2256-5337</issn>
<publisher>
<publisher-name>Instituto Tecnológico Metropolitano</publisher-name>
<publisher-loc>
<country>Colombia</country>
<email>tecnologicas@itm.edu.co</email>
</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="art-access-id" specific-use="redalyc">344276634005</article-id>
<article-id pub-id-type="doi">https://doi.org/10.22430/22565337.2923</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Artículos de investigación</subject>
</subj-group>
</article-categories>
<title-group>
<article-title xml:lang="en">
<bold>Semiotics: An Approach to Model Security Scenarios for IoT-Based Agriculture Software</bold>
</article-title>
<trans-title-group>
<trans-title xml:lang="en">Semiótica: un enfoque para modelar escenarios de seguridad para software de agricultura basado en IoT</trans-title>
</trans-title-group>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-2508-0962</contrib-id>
<name name-style="western">
<surname>Hurtado</surname>
<given-names>Julio Ariel</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<email>ahurtado@unicauca.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1388-0337</contrib-id>
<name name-style="western">
<surname>Antonelli</surname>
<given-names>Leandro</given-names>
</name>
<xref ref-type="aff" rid="aff2"/>
<email>lanto2004@gmail.com</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-8588-8365</contrib-id>
<name name-style="western">
<surname>López</surname>
<given-names>Santiago</given-names>
</name>
<xref ref-type="aff" rid="aff3"/>
<email>santiagolopez94@unicauca.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0008-5686-6408</contrib-id>
<name name-style="western">
<surname>Gómez</surname>
<given-names>Adriana</given-names>
</name>
<xref ref-type="corresp" rid="corresp1"/>
<xref ref-type="aff" rid="aff4"/>
<email>adrianagomezr@utp.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0007-7888-7544</contrib-id>
<name name-style="western">
<surname>Delle Ville</surname>
<given-names>Juliana</given-names>
</name>
<xref ref-type="aff" rid="aff5"/>
<email>jdelleville@lifia.info.unlp.edu.ar</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0005-7441-5828</contrib-id>
<name name-style="western">
<surname>Maltempo</surname>
<given-names>Giuliana</given-names>
</name>
<xref ref-type="aff" rid="aff6"/>
<email>gmaltempo@lifia.info.unlp.edu.ar</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0007-9629-4072</contrib-id>
<name name-style="western">
<surname>Zambrano</surname>
<given-names>Frey Giovanny</given-names>
</name>
<xref ref-type="aff" rid="aff7"/>
<email>freyzambrano@unicauca.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3342-0776</contrib-id>
<name name-style="western">
<surname>Solis</surname>
<given-names>Andrés</given-names>
</name>
<xref ref-type="aff" rid="aff8"/>
<email>asolis@unicomfacauca.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1973-3063</contrib-id>
<name name-style="western">
<surname>Camacho</surname>
<given-names>Marta Cecilia</given-names>
</name>
<xref ref-type="aff" rid="aff9"/>
<email>cecamacho@unimayor.edu.co</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7550-1067</contrib-id>
<name name-style="western">
<surname>Solinas</surname>
<given-names>Miguel</given-names>
</name>
<xref ref-type="aff" rid="aff10"/>
<email>miguel.solinas@unc.edu.ar</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1800-7342</contrib-id>
<name name-style="western">
<surname>Kaplan</surname>
<given-names>Gladys</given-names>
</name>
<xref ref-type="aff" rid="aff11"/>
<email>gladyskaplan@gmail.com</email>
</contrib>
<contrib contrib-type="author" corresp="no">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-8172-0530</contrib-id>
<name name-style="western">
<surname>Muñoz</surname>
<given-names>Freddy</given-names>
</name>
<xref ref-type="aff" rid="aff12"/>
<email>lfreddyms@gmail.com</email>
</contrib>
</contrib-group>
<aff id="aff1">
<institution content-type="original">Julio Ariel Hurtado. Universidad del Cauca, Popayán-Colombia. ahurtado@unicauca.edu.co</institution>
<institution content-type="orgname">Universidad del Cauca</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff2">
<institution content-type="original">Leandro Antonelli. Universidad Nacional de La Plata. lanto2004@gmail.com</institution>
<institution content-type="orgname">Universidad Nacional de La Plata</institution>
<country country="AR">Argentina</country>
</aff>
<aff id="aff3">
<institution content-type="original">Santiago López. Universidad del Cauca, Popayán-Colombia. santiagolopez94@unicauca.edu.co</institution>
<institution content-type="orgname">Universidad del Cauca</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff4">
<institution content-type="original">Adriana Gómez. Universidad Tecnológica de Pereira, Pereira-Colombia.  adrianagomezr@utp.edu.co</institution>
<institution content-type="orgname">Universidad Tecnológica de Pereira</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff5">
<institution content-type="original">Juliana Delle Ville. Universidad Nacional de La Plata, Buenos Aires-Argentina. jdelleville@lifia.info.unlp.edu.ar</institution>
<institution content-type="orgname">Universidad Nacional de La Plata</institution>
<country country="AR">Argentina</country>
</aff>
<aff id="aff6">
<institution content-type="original">Giuliana Maltempo. Universidad Nacional de La Plata, Buenos Aires-Argentina, gmaltempo@lifia.info.unlp.edu.ar</institution>
<institution content-type="orgname">Universidad Nacional de La Plata</institution>
<country country="AR">Argentina</country>
</aff>
<aff id="aff7">
<institution content-type="original">Frey Giovanny Zambrano. Universidad del Cauca, Popayán-Colombia. freyzambrano@unicauca.edu.co</institution>
<institution content-type="orgname">Universidad del Cauca</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff8">
<institution content-type="original">Andrés Solis. Corporación Universitaria Comfacauca, Popayán-Colombia. asolis@unicomfacauca.edu.co</institution>
<institution content-type="orgname">Corporación Universitaria Comfacauca</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff9">
<institution content-type="original">Marta Cecilia Camacho. Institución Universitaria Colegio Mayor del Cauca, Popayán-Colombia. cecamacho@unimayor.edu.co</institution>
<institution content-type="orgname">Institución Universitaria Colegio Mayor del Cauca</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff10">
<institution content-type="original">Miguel Solinas. Universidad Nacional de Córdoba, Córdoba-Argentina. miguel.solinas@unc.edu.ar</institution>
<institution content-type="orgname">Universidad Nacional de Córdoba</institution>
<country country="CO">Colombia</country>
</aff>
<aff id="aff11">
<institution content-type="original"> Gladys Kaplan. Universidad Nacional de La Matanza, San Justo-Argentina. gladyskaplan@gmail.com</institution>
<institution content-type="orgname">Universidad Nacional de La Matanza</institution>
<country country="AR">Argentina</country>
</aff>
<aff id="aff12">
<institution content-type="original">Frey Giovanny Zambrano. Fundación Universitaria de Popayán, Popayán-Colombia. lfreddyms@gmail.com</institution>
<institution content-type="orgname">Fundación Universitaria de Popayán</institution>
<country country="CO">Colombia</country>
</aff>
<author-notes>
<corresp id="corresp1">
<email>adrianagomezr@utp.edu.co</email>
</corresp>
</author-notes>
<pub-date pub-type="epub-ppub">
<year>2024</year>
</pub-date>
<volume>27</volume>
<issue>59</issue>
<fpage>1</fpage>
<lpage>21</lpage>
<history>
<date date-type="received" publication-format="dd mes yyyy">
<day>14</day>
<month>11</month>
<year>2023</year>
</date>
<date date-type="accepted" publication-format="dd mes yyyy">
<day>12</day>
<month>03</month>
<year>2024</year>
</date>
<date date-type="pub" publication-format="dd mes yyyy">
<day>17</day>
<month>04</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-year>2024</copyright-year>
<copyright-holder>Instituto Tecnológico Metropolitano</copyright-holder>
<ali:free_to_read/>
<license xlink:href="https://creativecommons.org/licenses/by-nc-sa/4.0/">
<ali:license_ref>https://creativecommons.org/licenses/by-nc-sa/4.0/</ali:license_ref>
<license-p>Esta obra está bajo una Licencia Creative Commons Atribución-NoComercial-CompartirIgual 4.0 Internacional.</license-p>
</license>
</permissions>
<self-uri content-type="html" xlink:href="https://revistas.itm.edu.co/index.php/tecnologicas/issue/view/135">https://revistas.itm.edu.co/index.php/tecnologicas/issue/view/135</self-uri>
<abstract xml:lang="en">
<title>Abstract</title>
<p>Agriculture is a vital human activity that contributes to sustainable development. A few decades ago, the agricultural sector adopted the Internet of Things (IoT), which has played a relevant role in precision and smart farming. The IoT developments in agriculture require that numerous connected devices work cooperatively. This increases the vulnerability of IoT devices, mainly because they lack the necessary built-in security because of their context and computational capacity. Other security threats to these devices are related to data storage and processing connected to edge or cloud servers. To ensure that IoT-based solutions meet functional and non-functional requirements, particularly those concerning security, software companies should adopt a security-focused approach to their software requirements specification. This paper proposes a method for specifying security scenarios, integrating requirements and architecture viewpoints into the context of IoT for agricultural solutions. The method comprises four steps: (i) describe scenarios for the intended software, (ii) describe scenarios with incorrect uses of the system, (iii) translate these scenarios into security scenarios using a set of rules, and (iv) improve the security scenarios. This paper also describes a prototype application that employs the proposed algorithm to strengthen the incorrect use scenario based on the correct use scenario. Then, the expert can complete the information for the analysis and subsequent derivation of the security scenario. In addition, this paper describes a preliminary validation of our approach. The results show that the proposed approach enables software engineers to define and analyze security scenarios in the IoT and agricultural contexts with good results. A survey administered to five security experts found that the proposed security scenario method is generally useful for specifying agricultural IoT solutions but needs improvement in different areas.</p>
</abstract>
<trans-abstract xml:lang="es">
<title>Resumen</title>
<p>La agricultura es una actividad humana vital que contribuye al desarrollo sostenible. Hace unas décadas, el sector agrícola introdujo el Internet de las Cosas (IoT), desempeñando un papel relevante en la agricultura de precisión e inteligente. Los desarrollos IoT en agricultura requieren colaboración entre múltiples dispositivos, lo que incrementa su vulnerabilidad, debido principalmente a la falta de seguridad integrada por restricciones del contexto. Otras amenazas a estos dispositivos conciernen el almacenamiento y procesamiento de datos conectados a servidores periféricos o en nube. Para garantizar que las soluciones IoT cumplen los requisitos funcionales y no funcionales, especialmente los de seguridad, las empresas de software deberían adoptar un enfoque centrado en la seguridad para su especificación de requerimientos de software. El objetivo del artículo consistió en proponer un método ligero para especificar escenarios de seguridad integrando los puntos de vista de requisitos y arquitectura en el contexto del IoT en soluciones agrícolas. El método comprende cuatro actividades: (i) crear escenarios de buen uso, (ii) crear escenarios de uso incorrecto, (iii) traducir el escenario anterior en escenario de seguridad aplicando reglas y (iv) refinar el escenario de seguridad resultante. También se describe un prototipo de herramienta que utiliza el algoritmo propuesto para ayudar a reforzar el escenario de uso incorrecto basado en el escenario de uso correcto, dando al experto la posibilidad de completar la información para el análisis y posterior derivación del escenario de seguridad. Por último, se proporciona una evaluación preliminar del método propuesto. Los resultados de mostraron que el enfoque propuesto permite a los ingenieros de software definir y analizar escenarios de seguridad en los contextos de IoT y agricultura con buenos resultados. La encuesta, aplicada a cinco expertos en seguridad, encontró que el método de escenario de seguridad propuesto es generalmente útil, pero necesita mejoras en diferentes áreas.</p>
</trans-abstract>
<kwd-group xml:lang="en">
<title>Keywords</title>
<kwd>IoT</kwd>
<kwd>Quality Scenario</kwd>
<kwd>IoT Requirements</kwd>
<kwd>Smart Farming</kwd>
<kwd>Industry 4.0</kwd>
<kwd>Intelligent Systems</kwd>
</kwd-group>
<kwd-group xml:lang="es">
<title>Palabras clave</title>
<kwd>IoT</kwd>
<kwd>Escenario de Calidad</kwd>
<kwd>Requerimientos de IoT</kwd>
<kwd>Agricultura Inteligente</kwd>
<kwd>Industria 4.0</kwd>
<kwd>Sistemas Inteligentes</kwd>
</kwd-group>
<counts>
<fig-count count="6"/>
<table-count count="8"/>
<equation-count count="0"/>
<ref-count count="46"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>How to cite / Cómo citar</meta-name>
<meta-value>J.A Hurtado et al., “Semiotics: An Approach to Model Security Scenarios for IoT-Based Agriculture Software,” <italic>Tecnológicas</italic>, vol. 27, no. 59, e2923, Apr. 2024. https://doi.org/10.22430/22565337.2923</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec>
<title>
<bold>Highlights </bold>
</title>
<p>
<bold>- </bold>Security Scenarios for Robust Ag-IoT Architecture</p>
<p>
<bold>- </bold>Uncovers Misuse Cases for Countermeasures</p>
<p>
<bold>-</bold> Lightweight, 4-Step Security Scenario Method</p>
<p>
<bold>-</bold> Expert Validation: Useful for Ag-IoT Security</p>
<p>
<bold>-</bold> Improves Agile Development for Smart Farms</p>
</sec>
<sec>
<title>
<bold>Highlights</bold>
</title>
<p>
<bold>-</bold> Escenarios de seguridad para una arquitectura robusta de Ag-IoT</p>
<p>
<bold>- </bold>Descubre casos de uso indebido de contramedidas</p>
<p>
<bold> -</bold> Método de escenario de seguridad ligero de 4 pasos</p>
<p>
<bold> - </bold>Validación de expertos: útil para la seguridad Ag-IoT</p>
<p>
<bold> -</bold> Mejora el desarrollo ágil para granjas inteligentes</p>
</sec>
<sec>
<title>
<bold>1. INTRODUCTION</bold>
</title>
<p>The International Telecommunication Union (ITU) defines IoT (Internet of Things) as a “global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies” [<xref ref-type="bibr" rid="redalyc_344276634005_ref1">1</xref>]. According to [<xref ref-type="bibr" rid="redalyc_344276634005_ref2">2</xref>], as an interconnected network, the IoT contributes to making decisions based on the information collected, and its interaction does not require human intervention. This definition includes the concept of a cyber-physical system, which is a complex abstraction that requires a conceptual map [<xref ref-type="bibr" rid="redalyc_344276634005_ref3">3</xref>] rather than a simple definition to explain the concept.</p>
<p>In software development, requirements analysis is a critical activity to define software functionalities, attributes, and quality properties. This process has distinctive characteristics when the software is constructed using emergent technologies like the IoT. Therefore, traditional software development practices must be adapted to these new technologies and business contexts [<xref ref-type="bibr" rid="redalyc_344276634005_ref2">2</xref>]. Requirements engineering involves collaboration between clients and development teams in order to incorporate the right features into the finished product [<xref ref-type="bibr" rid="redalyc_344276634005_ref4">4</xref>]. Inconsistencies between initial requirements and the final product could lead to reengineering processes, increasing the project’s scope and cost of the project [<xref ref-type="bibr" rid="redalyc_344276634005_ref5">5</xref>]. Requirements engineering works with two types of knowledge: explicit and tacit [<xref ref-type="bibr" rid="redalyc_344276634005_ref6">6</xref>]. Tacit knowledge is difficult to communicate because experts and development teams often have different backgrounds and use different terminologies [<xref ref-type="bibr" rid="redalyc_344276634005_ref7">7</xref>]–[<xref ref-type="bibr" rid="redalyc_344276634005_ref9">9</xref>], making it challenging to obtain information from stakeholders.</p>
<p>Software products are defined by a set of functional and non-functional requirements. The latter determine the product’s quality and are most frequently considered when an IoT system is developed according to its specific application domain [<xref ref-type="bibr" rid="redalyc_344276634005_ref2">2</xref>]. One way of specifying software requirements is to describe <italic>use scenarios</italic>employing storytelling techniques. The effectiveness of this approach lies in the possibility of incorporating details that are essential to achieve a rich consolidation of knowledge. Scenarios use natural language, allowing experts to use them without complex formalisms. This makes them highly effective in promoting communication and collaboration among diverse groups of experts [<xref ref-type="bibr" rid="redalyc_344276634005_ref10">10</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref11">11</xref>].</p>
<p>In the development of IoT products, the main challenges for non-functional requirements are limited processing and storage capacity, performance reliability, availability, accessibility, interoperability, security, privacy, scalability flexibility, and context awareness [<xref ref-type="bibr" rid="redalyc_344276634005_ref2">2</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref12">12</xref>]. It follows that security is a highly relevant aspect in IoT-based software because it concerns the protection of resources such as modules, code, and others from unauthorized access [<xref ref-type="bibr" rid="redalyc_344276634005_ref12">12</xref>]. Using scenarios, experts from different domains can describe various situations and work together to improve them, learning from one another in the process. This can be especially valuable when dealing with complex problems that require input from multiple perspectives. Overall, scenario-based design can be a powerful tool for fostering cooperation and achieving better outcomes in a wide range of domains.</p>
<p>A software architect should consider incorporating security into a whole system as soon as stakeholders identify security concerns rather than adding security technologies in an ad-hoc manner [<xref ref-type="bibr" rid="redalyc_344276634005_ref13">13</xref>]. As Bruce Schneier points out [<xref ref-type="bibr" rid="redalyc_344276634005_ref14">14</xref>], security is a process and a chain that is only as strong as its weakest link. Therefore, software providers should adopt a security-centric approach to designing and developing IoT-based solutions that meet functional and non-functional requirements like security [<xref ref-type="bibr" rid="redalyc_344276634005_ref15">15</xref>].</p>
<p>The agricultural sector now requires data collection and advanced technologies to improve production while using limited resources. Sustainable agriculture can help to preserve nature without compromising the needs of future generations [<xref ref-type="bibr" rid="redalyc_344276634005_ref16">16</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref17">17</xref>]. The Food and Agriculture Organization (FAO) of the United Nations has identified population growth, resource scarcity, and degradation as key future challenges. There is a need to increase the efficiency, productivity, and quality of agrifood systems while protecting the environment [<xref ref-type="bibr" rid="redalyc_344276634005_ref18">18</xref>]. To achieve this, new developments and technologies must be introduced to automate traditional farming methods and make farm labor more efficient. The Internet of Things (IoT) seems to be able to transform these conventional processes [<xref ref-type="bibr" rid="redalyc_344276634005_ref16">16</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref17">17</xref>].</p>
<p>Compared with traditional IT systems, their IoT counterparts face distinct security challenges that are primarily due to the presence of resource-constrained devices. Currently, the of IoT platforms are not adequately structured to handle different threats and attacks in an organized manner. These limitations make IoT systems more susceptible to a wide range of attack vectors, posing potential threats to their security [<xref ref-type="bibr" rid="redalyc_344276634005_ref19">19</xref>]. Furthermore, traditional protection schemes used in the conventional internet and IoT are not as useful for agricultural systems, which creates opportunities and research gaps [<xref ref-type="bibr" rid="redalyc_344276634005_ref20">20</xref>]–[<xref ref-type="bibr" rid="redalyc_344276634005_ref22">22</xref>]. Therefore, an accurate identification and understanding of their specific security requirements is crucial to develop such IoT-based agricultural systems.</p>
<p>This paper proposes a scenario-based method for specifying security aspects. The method is composed of four essential steps: (i) describe scenarios for the intended software application, (ii) describe scenarios related to the previous ones but in which the application is used incorrectly, (iii) apply a set of rules to map attributes from the previous scenarios into architectural scenarios, and (iv) describe the architectural scenarios in more detail. Additionally, this paper describes a preliminary evaluation of the proposed approach. Considering the security challenges that agricultural IoT faces today, this paper addresses the following research question: <italic>How can we adequately elicit security requirements for smart IoT-based agricultural solutions?</italic>
</p>
<p>The proposed method includes an application prototype called Requirement Healer, which uses natural language processing techniques. Its aim is to make the information contained in a scenario more robust by applying natural language processing techniques to extend the scenarios with precise information extracted from catalogs designed for this prototype. Our prototype provides support for the four steps in the proposed method. The prototype provides the user with a form to write about scenarios for a software application, including incorrect use scenarios. It allows the user to sort all the scenarios by name and, after selecting one incorrect use scenario, it derivates security scenarios by applying the mapping rules proposed here. Then, the user only needs to edit the security scenarios generated by the prototype in order to fine-tune their description.</p>
<p>The paper is organized in the following way. Section 2 describes some background to the scenarios. Then, Section 3 reviews related works. Section 4 details our contribution, namely the proposed approach. Section 5 presents a preliminary evaluation. Section 6 introduces the supporting prototype that complements the information about the scenarios. Finally, Section 7 discusses our conclusions.</p>
</sec>
<sec>
<title>
<bold>2. BACKGROUND</bold>
</title>
<p>This section describes two types of scenarios: scenarios that focus on the functionality of a software application and those that focus on architectural security concerns.</p>
<sec>
<title>
<bold>2.1 Scenarios describing functionality</bold>
</title>
<p>A scenario [<xref ref-type="bibr" rid="redalyc_344276634005_ref10">10</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref11">11</xref>] is an artifact that describes situations (within the application or the software domain) using natural language. It describes a specific situation that may arise in a certain context to achieve some goal. The scenario includes a set of steps (episodes) to reach that goal. In the episodes, active agents (actors) use materials, tools, and data (resources) to perform some specific action. Although there are many templates to describe scenarios, this paper will use the one proposed by [<xref ref-type="bibr" rid="redalyc_344276634005_ref23">23</xref>]. <xref ref-type="table" rid="gt1">Table 1</xref> summarizes the template.</p>
<p>
<table-wrap id="gt1">
<label>Table 1.</label>
<caption>
<title>Template for describing scenarios that focus on functionality.</title>
</caption>
<alt-text>Table 1. Template for describing scenarios that focus on functionality.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt2.png" position="anchor" orientation="portrait"/>
<table style="width:425.2pt;border-collapse:collapse;border:none;" id="gt2-526564616c7963">
<tbody>
<tr style="height:11.35pt">
<td style="width:5.0cm;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Attribute</td>
<td style="width:283.45pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Description</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Scenario title</td>
<td style="width:283.45pt;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">ID</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Goal</td>
<td style="width:283.45pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Objective</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Context</td>
<td style="width:283.45pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Starting point (time, place, activities previously achieved)</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Actors</td>
<td style="width:283.45pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Active agents</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Resources</td>
<td style="width:283.45pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Passive elements (tools, materials, data)</td>
</tr>
<tr style="height:11.35pt">
<td style="width:5.0cm;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Episodes</td>
<td style="width:283.45pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">List of actions, simple breakdown with no conditions, no iterations</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold> Source:</bold> Own work.</attrib>
</table-wrap>
</p>
<p>Let’s consider the following example scenario describing how an irrigation system is activated. This task could be done in different ways depending on the technological infrastructure of the farm. For example, an operator could manually start the irrigation by physically entering the machine room where the pumps are. In this situation, no IoT software application is involved. Instead, this paper will focus on another kind of scenario where it is a software application that activates the pumps. Now, the example goes as follows: An expert in agriculture evaluates the field conditions to determine whether irrigation is necessary and provides the information to the farm supervisor. Then, the supervisor activates the irrigation pipe using an IoT-based web application. <xref ref-type="table" rid="gt2">Table 2</xref> summarizes the situation.</p>
<p>The previous scenario describes an authorized person’s legitimate use of the software application to activate the irrigation system. This scenario could be similar to a use case or user story [<xref ref-type="bibr" rid="redalyc_344276634005_ref7">7</xref>]–[<xref ref-type="bibr" rid="redalyc_344276634005_ref9">9</xref>]. However, the software system could be vulnerable to hacking attacks, where a malicious user intends to break into the web software application to start the irrigation system either just for fun or to destroy the crop. This incorrect and harmful utilization of the software application is regarded as a misuse case [<xref ref-type="bibr" rid="redalyc_344276634005_ref24">24</xref>].</p>
<p>
<table-wrap id="gt2">
<label>Table 2.</label>
<caption>
<title>Authorized attempt to start the irrigation system.</title>
</caption>
<alt-text>Table 2.  Authorized attempt to start the irrigation system.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt3.png" position="anchor" orientation="portrait"/>
<table style="width:462.05pt;border-collapse:collapse;border:none;" id="gt3-526564616c7963">
<tbody>
<tr style="height:11.35pt">
<td style="width:3.0cm;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Attribute</td>
<td style="width:377.0pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Description</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Scenario title</td>
<td style="width:377.0pt;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:11.35pt">Attempt to access the water irrigation infrastructure by an authorized person.</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Goal</td>
<td style="width:377.0pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Protect access to the water irrigation system to ensure that water is used responsibly.</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Context</td>
<td style="width:377.0pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">The farm has irrigation infrastructure (pipes, tanks, pumps, and valves) to water (irrigate) the field.</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Actors</td>
<td style="width:377.0pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Expert, Supervisor.</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Resources</td>
<td style="width:377.0pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Checklist to determine if it is necessary to irrigate the field. Security protocol to have access to and operate the pump and valves.</td>
</tr>
<tr style="height:11.35pt">
<td style="width:3.0cm;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">Episodes</td>
<td style="width:377.0pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:11.35pt">·     An expert evaluates the conditions of the field to determine if it is necessary to irrigate. ·     The expert writes a report to the supervisor with the recommendation to irrigate. ·     The supervisor logs in to the IoT web application. ·     The supervisor starts the pump and opens the valves.</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source:</bold> Own work.</attrib>
</table-wrap>
</p>
</sec>
<sec>
<title>
<bold>2.2 Scenarios describing architectural security concerns</bold>
</title>
<p>Software architecture is the process of designing a system’s fundamental structure and organization to achieve specific quality attributes. Quality Attributes (QA) are critical non-functional characteristics that determine the system’s overall effectiveness. QAs are specified using quality scenarios, which define how the system should behave under various conditions. A Quality Attribute scenario is a specific, testable scenario that demonstrates how a QA requirement is satisfied. A QA scenario is typically structured with an ID, a stimulus that triggers the interaction with the software application, the environment where the interaction occurs, the affected artifact, the response, and some quantitative description of the response. <xref ref-type="table" rid="gt3">Table 3</xref> summarizes a template for this kind of scenarios.</p>
<p>
<table-wrap id="gt3">
<label>Table 3.</label>
<caption>
<title>Security scenario template.</title>
</caption>
<alt-text>Table 3.  Security scenario template.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt4.png" position="anchor" orientation="portrait"/>
<table style="width:473.4pt;border-collapse:collapse;border:none;" id="gt4-526564616c7963">
<tbody>
<tr style="height:11.35pt">
<td style="width:121.9pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:11.35pt">Attribute</td>
<td style="width:351.5pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:11.35pt">Description</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;border:none;   padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Scenario ID</td>
<td style="width:351.5pt;border:none;   padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Unique Some identification of the scenario.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Source of the Stimulus</td>
<td style="width:351.5pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Some human, system or any other actor generates a stimulus to the system.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Stimulus</td>
<td style="width:351.5pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">It is an input condition that generates a response from the system.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Environment</td>
<td style="width:351.5pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">The stimulus occurs under a certain context. The system may have an overload context, normal operation, or some other relevant state. For many systems, "normal" operation can refer to one of a number of modes. For these kinds of systems, the environment should specify in which mode the system is executing</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Artifact</td>
<td style="width:351.5pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">The stimulated artifact. This may be an ecosystem, a whole system, a component, or some set of components.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Response</td>
<td style="width:351.5pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">It is the response as the result of the arrival of the stimulus.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Response Measure</td>
<td style="width:351.5pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">The response should be measurable so that the requirement can be tested.</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source:</bold> Own work.</attrib>
</table-wrap>
</p>
<p>Security refers to a system’s capability to defend itself against danger, ensure its safe-ty, and protect system data from unauthorized disclosure, modification, or destruction. Security involves protecting computer systems using technical and administrative safeguards. Additionally, security refers to the degree to which a particular security policy is enforced with some level of assurance. The three fundamental types of security concerns are confidentiality, integrity, and availability. Confidentiality refers to the protection of data and processes from unauthorized disclosure or access by individuals or entities that are not authorized to access them. Integrity refers to protecting data and processes from unauthorized modification, whether intentional or accidental. It includes ensuring that data are not tampered with or corrupted during storage, processing, or transmission. And availability refers to the protection of data and processes from denial-of-service attacks or other forms of disruption that could prevent authorized users from accessing or using them. This includes ensuring that systems are available and responsive when needed and that they can handle high levels of traffic or activity without becoming over-loaded or crashing. <xref ref-type="table" rid="gt4">Table 4 </xref>is an example of a security scenario that refers to the same situation as the requirement scenario described in <xref ref-type="table" rid="gt2">Table 2</xref>.</p>
<p>
<table-wrap id="gt4">
<label>Table 4.</label>
<caption>
<title>Security scenario example.</title>
</caption>
<alt-text>Table 4.  Security scenario example.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt5.png" position="anchor" orientation="portrait"/>
<table style="border-collapse:collapse;border:none;" id="gt5-526564616c7963">
<tbody>
<tr style="height:14.15pt">
<td style="width:121.9pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Attribute</td>
<td style="width:331.65pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Description</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;border:none;   padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">ID</td>
<td style="width:331.65pt;border:none;   padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">S01</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Source of stimulus</td>
<td style="width:331.65pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">An unauthorized individual attempts to access the water irrigation system through an IoT-connected device.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Stimulus</td>
<td style="width:331.65pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">The individual attempts to gain access to sensitive data (sensor measurements) or to manipulate the system’s functionality (change the valve behavior).</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Environment</td>
<td style="width:331.65pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Normal execution. The system has IoT-connected devices that are used to access the functionality of the solution, such as sensors, actuators, and processors.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Artifact</td>
<td style="width:331.65pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Security protocol and access control subsystem.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Response</td>
<td style="width:331.65pt;padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">The security protocols detect the unauthorized access attempt and ban the individual from the access control subsystem.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:121.9pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Response measure</td>
<td style="width:331.65pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Ensure the security of the system. Attacks should be detected quickly, ideally within 0.5 seconds. Additionally, the system must have a high rate of success in resisting attack attempts, with a target success rate above 95 %.</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</table-wrap>
</p>
</sec>
</sec>
<sec>
<title>
<bold>3. RELATED WORK</bold>
</title>
<p>The complexity of IoT software applications is a concern that has been identified by several researchers. Thus, some proposals to deal with this complexity are available [<xref ref-type="bibr" rid="redalyc_344276634005_ref25">25</xref>] proposed FRASAD, a model-driven software development framework to manage the complexity of IoT applications. [<xref ref-type="bibr" rid="redalyc_344276634005_ref26">26</xref>] proposed another approach to deal with this complexity. Their approach includes activities such as requirements development, domain-specific design, verification, simulation, analysis, calibration, deployment, code generation, and execution. However, none of these proposals considers security, which is our main concern.</p>
<p>Some other approaches have indeed considered the security issue, but in terms of implementation, whereas our proposal considers security in terms of requirements specification. [<xref ref-type="bibr" rid="redalyc_344276634005_ref27">27</xref>] proposed a process and a tool to apply formal methods in IoT applications using the Unified Modeling Language (UML). They developed a plug-in tool that validates UML software models to design secure software applications. [<xref ref-type="bibr" rid="redalyc_344276634005_ref28">28</xref>] presented a taxonomy of security requirements that should be considered when a software application is designed and implemented. [<xref ref-type="bibr" rid="redalyc_344276634005_ref19">19</xref>] proposed a security architecture to provide security enabled IoT services and a baseline for security deployment. Their architectural solution plays a crucial role in their study because it addresses the security requirements of IoT systems. These security requirements are useful components of our security scenarios proposal. By focusing on these requirements, we can effectively establish a robust security framework at the requirements level. [<xref ref-type="bibr" rid="redalyc_344276634005_ref29">29</xref>] established security requirements for IoT systems and focused on enhancing the security of smart home applications. The requirements they identified complement our proposal because they introduce significant vocabulary for describing security scenarios in the context of the IoT and smart farming. By incorporating these elicited requirements, we can effectively address the specific security challenges and other considerations associated with IoT and smart farming environments.</p>
<p>Multiple approaches in the literature have considered security among software requirements, but they have not addressed how to specify security requirements precisely. In [<xref ref-type="bibr" rid="redalyc_344276634005_ref30">30</xref>] was presented a comprehensive literature review of IoT security requirements, but they did not include any references on how to specify them. The proposal by [<xref ref-type="bibr" rid="redalyc_344276634005_ref31">31</xref>] deals with different non-functional requirements: security, scalability, and performance. They tried to balance different requirements or decide which one to satisfy when there is a conflict. [<xref ref-type="bibr" rid="redalyc_344276634005_ref32">32</xref>] also dealt with conflicts, but her approach involves non-functional requirements.</p>
<p>Finally, [<xref ref-type="bibr" rid="redalyc_344276634005_ref33">33</xref>] presented an approach to specify security requirements for IoT applications. They combined a framework for requirement elicitation with automated reasoning to provide secure IoT for vulnerable users in healthcare scenarios. They mapped technical system requirements using high-level logical modelling. Then, they performed an attack tree analysis and a security protocol analysis. Their work concentrated on the attack tree analysis to identify the situation, while our approach focuses on how to describe security requirements precisely.</p>
</sec>
<sec>
<title>
<bold>4. OUR APPROACH</bold>
</title>
<p>This section describes our general approach, followed by a detailed explanation of each step.</p>
<sec>
<title>
<bold>4.1 Our approach in a nutshell</bold>
</title>
<p>Our proposed approach consists of several steps. First, we describe scenarios that outline the intended use of the software. Next, we create scenarios that describe incorrect use of the application in an attempt to exploit any vulnerabilities. We then convert these scenarios into security scenarios by applying a set of preestablished rules. Lastly, we refine and improve the security scenarios. <xref ref-type="fig" rid="gf1">Figure 1</xref> summarizes our approach.</p>
<p>
<fig id="gf1">
<label>Figure 1.</label>
<caption>
<title>Our approach in a nutshell.</title>
</caption>
<alt-text>Figure 1.   Our approach in a nutshell.</alt-text>
<graphic xlink:href="344276634005_gf5.png" position="anchor" orientation="portrait"/>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</fig>
</p>
</sec>
<sec>
<title>
<bold>4.2 Description of scenarios with correct use of the indented software application</bold>
</title>
<p>The first step is the description of scenarios that focus on the correct use of the software application regarding security concerns. This step should be completed by a requirement engineer or analyst (or a group of them), who should interact with domain experts (clients, users, and stakeholders in general) to capture the requirements for the software application and specify scenarios. They should describe the functionality of the intended software and also consider security concerns. Therefore, the analyst eliciting and defining scenarios should have some background knowledge of non-functional security requirements in order to include this concern in the specifications. The result of this step is a set of scenarios that describe the functionality, as illustrated in T<xref ref-type="table" rid="gt2">able 2</xref>.</p>
</sec>
<sec>
<title>
<bold>4.3 Description of scenarios with incorrect use of the indented software application</bold>
</title>
<p>The second step is analyzing the scenarios that were described in the previous step to find security issues. Issues that exploit the problems and compromise the security of the software application are described. Ideally, this step should be completed by the same requirements engineer (or group of them) that participated in the previous tasks. They should analyze every scenario in detail and consider guidelines such as those proposed by [<xref ref-type="bibr" rid="redalyc_344276634005_ref34">34</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref21">21</xref>]. Then, they describe scenarios of incorrect use of the software application. Basically, they should describe scenarios that exploit possible vulnerabilities. For example, considering the scenario of correct use of the software application to activate the irrigation system (<xref ref-type="table" rid="gt2">Table 2</xref>), the requirements engineer may determine that the access to the system (and therefore the access to the activation of the pumps) constitutes a security breach. Hence, they describe a scenario where an unauthorized person gains access to the software application and, consequently, to the irrigation infrastructure. <xref ref-type="table" rid="gt5">Table 5</xref> describes this scenario of unauthorized access.</p>
<p>
<table-wrap id="gt5">
<label>Table 5.</label>
<caption>
<title>Unauthorized attempt to start the irrigation system.</title>
</caption>
<alt-text>Table 5. Unauthorized attempt to start the irrigation system.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt6.png" position="anchor" orientation="portrait"/>
<table style="border-collapse:collapse;border:none;  " id="gt6-526564616c7963">
<tbody>
<tr style="height:14.15pt">
<td style="width:79.35pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Scenario title</td>
<td style="width:368.5pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">Attempt to access the water irrigation infrastructure by an unauthorized person.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:79.35pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Goal</td>
<td style="width:368.5pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Protect access to the water irrigation system to ensure that water is used responsibly.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:79.35pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Context</td>
<td style="width:368.5pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">The farm has irrigation infrastructure (pipes, tanks, pumps, and valves) to water (irrigate) the field.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:79.35pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Actors</td>
<td style="width:368.5pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Unauthorized person.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:79.35pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Resources</td>
<td style="width:368.5pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Checklist to determine if it is necessary to irrigate the field. Security protocol to access and operate the pump and valves.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:79.35pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">Episodes</td>
<td style="width:368.5pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">•An unauthorized person gains access to the IoT web application. •An unauthorized person starts the pump and opens the valves.</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</table-wrap>
</p>
</sec>
<sec>
<title>
<bold>4.4 Derivation of security scenarios</bold>
</title>
<p>In this step, a set of rules is described to map the information contained in an incorrect use scenario. The goal is to obtain a first draft of a scenario describing security concerns. It is worth mentioning that the incorrect use scenario will not provide enough information for a complete security scenario. The rules proposed here use only four attributes from the incorrect use scenario (title, context, actors, and resources) to fill out four attributes of the security scenario (stimulus, environment, source of the stimulus, and artifact).</p>
<p>With this information, the following step is to refine the security scenario. <xref ref-type="table" rid="gt6">Table 6</xref> summarizes the mapping between attributes of the two types of scenarios. Following the example of the incorrect use scenario described in <xref ref-type="table" rid="gt5">Table 5</xref>, the scenario obtained by applying the proposed rules is shown in <xref ref-type="table" rid="gt7">Table 7</xref>. This preliminary scenario is still far from being a full-fledged security scenario such as that described in <xref ref-type="table" rid="gt4">Table 4</xref>. It needs to be refined in the following step.</p>
<p>
<table-wrap id="gt6">
<label>Table 6.</label>
<caption>
<title>Mapping rules between attributes of the incorrect use and security scenarios.</title>
</caption>
<alt-text>Table 6. Mapping rules between attributes of the incorrect use and security scenarios.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt7.png" position="anchor" orientation="portrait"/>
<table style="width:419.9pt;border-collapse:collapse;border:none;" id="gt7-526564616c7963">
<tbody>
<tr style="height:14.15pt">
<td style="width:181.6pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Attribute of the incorrect use scenario</td>
<td style="width:238.3pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Attribute of the security scenario</td>
</tr>
<tr style="height:14.15pt">
<td style="width:181.6pt;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Title</td>
<td style="width:238.3pt;border:none;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Stimulus</td>
</tr>
<tr style="height:14.15pt">
<td style="width:181.6pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Context</td>
<td style="width:238.3pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Environment + Source of the stimulus</td>
</tr>
<tr style="height:14.15pt">
<td style="width:181.6pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Actors</td>
<td style="width:238.3pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Sources of stimulus</td>
</tr>
<tr style="height:14.15pt">
<td style="width:181.6pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Resources</td>
<td style="width:238.3pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Artifact</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source:</bold> Own work</attrib>
</table-wrap>
</p>
<p>
<table-wrap id="gt7">
<label>Table 7.</label>
<caption>
<title>Result of applying the mapping rules between attributes of the incorrect use and security scenarios.</title>
</caption>
<alt-text>Table 7. Result of applying the mapping rules between attributes of the incorrect use and security scenarios.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt8.png" position="anchor" orientation="portrait"/>
<table style="width:445.05pt;border-collapse:collapse;border:none;" id="gt8-526564616c7963">
<tbody>
<tr style="height:14.15pt">
<td style="width:167.25pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Attribute</td>
<td style="width:277.8pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Description</td>
</tr>
<tr style="height:14.15pt">
<td style="width:167.25pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Stimulus</td>
<td style="width:277.8pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Attempt to access the water irrigation infrastructure by an unauthorized person.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:167.25pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Environment + Source of stimulus</td>
<td style="width:277.8pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">The farm has an irrigation infrastructure (pipes, tanks, pumps) to water (irrigate) the field. An unauthorized person attempts to operate the pump and the valve to irrigate the field.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:167.25pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Source of stimulus</td>
<td style="width:277.8pt;border:none;padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Unauthorized person.</td>
</tr>
<tr style="height:14.15pt">
<td style="width:167.25pt;border:none;border-bottom:   solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;height:14.15pt">Artifact</td>
<td style="width:277.8pt;border:none;border-bottom:solid windowtext 1.0pt;   padding:1.5pt 2.25pt 1.5pt 2.25pt;   height:14.15pt">Checklist to determine if it is necessary to irrigate the field. Security protocol to access and operate the pump and valves.</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</table-wrap>
</p>
</sec>
<sec>
<title>
<bold> 4.5 Refinement of security scenarios</bold>
</title>
<p>Some adjustments and improvements should be made to the scenarios derived from the mapping in the previous step. Some new information should be added, and some should be rephrased. The requirements engineer should use their experience and knowledge to provide further information and paraphrase other based on the elicitation meeting and their expertise in the field. First, the security scenario should be assigned an ID to identify it in the software development process; this is a minor task related to documentation definitions. Afterwards, the <italic>stimulus, environment, source of stimulus, and artifact </italic>attributes should be rephrased to adapt the information obtained in the previous step. Both the <italic>environment</italic> and <italic>source of stimulus</italic> attributes capture data from a single attribute in the incorrect use scenario (i.e., <italic>context</italic>). Therefore, in the security scenario, the information in <italic>context</italic> should be split into two attributes. Finally, the <italic>response</italic> and <italic>response measure</italic> attributes should be defined from scratch. Although the mapping rules do not provide information about these two attributes, the descriptions found in the rest of the scenario provide the context that requirements engineers need to define them. Requirements engineers should bear in mind that the <italic>response measure</italic> attribute, in particular, should be described with quantitative measures. The tool described in the following section can support this task.</p>
<p>
<xref ref-type="table" rid="gt8">Table 8 </xref>summarizes the necessary refinements in this step. The scenario described at the beginning of this paper in Table 4 is an example of the kind of scenario that this approach aims to obtain.</p>
<p>
<table-wrap id="gt8">
<label>Table 8.</label>
<caption>
<title>Refinement to the security scenarios.</title>
</caption>
<alt-text>Table 8.  Refinement to the security scenarios.</alt-text>
<alternatives>
<graphic xlink:href="344276634005_gt9.png" position="anchor" orientation="portrait"/>
<table style="border-collapse:collapse;border:none;  " id="gt9-526564616c7963">
<tbody>
<tr style="height:14.15pt">
<td style="width:144.6pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">1. An <italic>ID</italic> must be assigned.</td>
<td style="width:144.6pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">2. <italic>Stimulus</italic> must be rephrased.</td>
<td style="width:144.6pt;border-top:solid windowtext 1.0pt;   border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none;      padding:0cm 5.4pt 0cm 5.4pt;height:14.15pt">3. <italic>Context </italic>must be split in two attributes (i.e., <italic>environment</italic> and <italic>source of stimulus</italic>).</td>
</tr>
<tr style="height:14.15pt">
<td style="width:144.6pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">4. <italic>Source of stimulus</italic> must be rephrased.</td>
<td style="width:144.6pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">5. <italic>Artifact</italic> must be rephrased.</td>
<td style="width:144.6pt;border:none;border-bottom:solid windowtext 1.0pt;      padding:0cm 5.4pt 0cm 5.4pt;   height:14.15pt">6. <italic>Response</italic> and <italic>response measure</italic> must be added</td>
</tr>
</tbody>
</table>
</alternatives>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</table-wrap>
</p>
<p>Security scenarios in smart farms and IoT require a specific vocabulary so that they are accurately described [<xref ref-type="bibr" rid="redalyc_344276634005_ref29">29</xref>] argue, there are several concerns to take into account as part of these scenarios. One such concern is technology-dependent security for IoT devices (<italic>artifact</italic>), which refers to the security measures required in the IoT context (<italic>environment</italic>). Another important aspect is the authentication of IoT objects and individuals (<italic>sources of stimulus</italic>) using various mechanisms to prevent or detect attacks (<italic>responses</italic>). These responses to potential security threats have several limits (<italic>response measure</italic>). Requirements engineers could use this vocabulary as specialized terminology and a semiotic tool.</p>
</sec>
</sec>
<sec>
<title>
<bold>5. ASSESSMENT OF THE APPROACH</bold>
</title>
<sec>
<title>
<bold>5.1 Assessment Design</bold>
</title>
<p>Next, we assessed the acceptance of our approach by security experts in the field of IoT-based smart agriculture, using the Technology Acceptance Model (TAM) [<xref ref-type="bibr" rid="redalyc_344276634005_ref35">35</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref36">36</xref>] to guide our evaluation. Specifically, we were interested in understanding to what extent our approach was accepted by its target audience. To evaluate the usefulness and ease of use of our approach, we adopted two well-known and widely used metrics-Perceived Usefulness and Perceived Ease of Use-as defined in Fred D. Davis’s work [<xref ref-type="bibr" rid="redalyc_344276634005_ref35">35</xref>]. To this end, we designed and administered a survey to a group of security professionals who are representative of our target audience and have experience in eliciting security requirements. Conducting the survey with this group provided us with valuable feedback and insights that helped us to identify strengths and weaknesses in our approach and ultimately improve its overall acceptance.</p>
</sec>
<sec>
<title>
<bold>5.2 Survey Application and Data Collection</bold>
</title>
<p>We conducted a survey with a group of five experts in the field of software and network security. Prior to the survey, we presented our methodology to the group and spent approximately 40 minutes discussing and addressing any questions they had. Once we presented our approach, we administered a survey that included 17 close-ended and three open-ended questions. The survey aimed to gather insights from the experts on the perceived ease-of-use and usefulness of our method. Most of the experts found the proposed security scenario method to be a useful tool for specifying the requirements of agricultural IoT solutions. Half of them think that the proposed method simplifies the process of specifying security requirements, resulting in better quality and control of the specification.</p>
<p>The experts noted that the proposed method is well-defined, easy to understand, and flexible, making it ideal for defining scenarios. Additionally, the evaluation revealed that most (over 60 %) found it to be clear, well-structured, and interactive in its.</p>
</sec>
<sec>
<title>
<bold>5.3 Results and Analysis</bold>
</title>
<p>While the method was generally perceived as useful and easy to use for developing security scenarios, it was suggested that it needs to be more specific to determine its usefulness in practice. The experts suggested that the method could be enhanced to include specific aspects of cybersecurity, as well as development and implementation elements that are essential to ensuring the security of agricultural IoT systems. This would allow for a complete specification of the security requirements of such systems. Furthermore, it was noted that users need to interact with the method to remember its steps. During the evaluation, the experts identified some areas for improvement, such as incorporating vulnerabilities and risks commonly found in IoT systems, considering different types of users and adversaries, and taking into account various attack vectors.</p>
<p>By applying these suggestions, the proposed method could be further refined to better meet the needs of users and enhance the security of agricultural IoT systems, particularly adding this information to the terminology of the field.</p>
</sec>
</sec>
<sec>
<title>
<bold>6. PROTOTYPE OF THE SUPPORT TOOL</bold>
</title>
<p>A computer tool (software application) was prototyped to support the approach proposed in this article. This prototype aims to make the incorrect use scenarios more robust to aid the subsequent derivation of security scenarios. Therefore, the prototype described in this section plays a fundamental role between steps (ii) and (iii) in our method, that is, after the creation of scenarios describing incorrect uses of an application but before the derivation of security scenarios.</p>
<p>The tool was prototyped as an extension of Requirements Healer. It was implemented in Python [<xref ref-type="bibr" rid="redalyc_344276634005_ref37">37</xref>] using libraries such as spaCy [<xref ref-type="bibr" rid="redalyc_344276634005_ref38">38</xref>], an NLP library, and textblob [<xref ref-type="bibr" rid="redalyc_344276634005_ref39">39</xref>].</p>
<p>Requirements Healer is a web application that can be run on desktop computers as well as mobile phones. It currently manages different projects and supports different kinds of artifacts written in natural language. Scenarios are one kind of artifact, but the application can be easily extended to support other artifacts such as user stories, use cases, etc.</p>
<p>Our prototype supports the different steps in our approach. It provides users with an edition form where they can write about scenarios for a software application, including incorrect use scenarios. <xref ref-type="fig" rid="gf2">Figure 2</xref> and <xref ref-type="fig" rid="gf3">Figure 3 </xref>show the forms for a correct use scenario and an incorrect use scenario, respectively. The prototype allows the user to sort the scenarios by name and, after selecting one incorrect use scenario, it performs the derivation of security scenarios by applying the mapping rules proposed here. Then, the user can edit the security scenarios to improve their description.</p>
<p>
<fig id="gf2">
<label>Figure 2.</label>
<caption>
<title>Correct use scenario.</title>
</caption>
<alt-text>Figure 2.  Correct use scenario.</alt-text>
<graphic xlink:href="344276634005_gf6.png" position="anchor" orientation="portrait"/>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</fig>
</p>
<p>
<fig id="gf3">
<label>Figure 3.</label>
<caption>
<title>Incorrect use scenario to process the keywords.</title>
</caption>
<alt-text>Figure 3.  Incorrect use scenario to process the keywords.</alt-text>
<graphic xlink:href="344276634005_gf7.png" position="anchor" orientation="portrait"/>
<attrib>
<bold>Source: </bold>Own work.</attrib>
</fig>
</p>
<p>The prototype uses natural language processing tools to assist the requirements engineer in the description of security scenarios. For example, using lemmatization and stemming techniques, the prototype can verify whether certain terms or expressions listed in a glossary have been used in the scenario. Assessing the presence of certain types of expressions within the fields of an incorrect use scenario will allow us to find the most appropriate technique for coping with the issue described in the scenario. This procedure (explained in more detail below) is vital to make the incorrect use scenarios more robust.</p>
<sec>
<title>
<bold>6.1 Catalogs</bold>
</title>
<p>The aim of the prototype is to make the information contained in a scenario more robust, using natural language processing techniques to extend the scenarios with precise information contained in catalogs that have been specifically designed for this prototype [<xref ref-type="bibr" rid="redalyc_344276634005_ref40">40</xref>]. The literature was reviewed to obtain relevant information about the most common attacks that threaten IoT-based agricultural solutions [<xref ref-type="bibr" rid="redalyc_344276634005_ref12">12</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref20">20</xref>]–[<xref ref-type="bibr" rid="redalyc_344276634005_ref22">22</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref41">41</xref>]–[<xref ref-type="bibr" rid="redalyc_344276634005_ref45">45</xref>]. Special attention was paid to identify vulnerabilities and specific attacks, the Quality Attribute (QA), and the architectural layer affected by each type of attack, as well as the corresponding mechanisms to mitigate them. The information thus obtained was transferred to the two following catalogs:</p>
<p>
<list list-type="simple">
<title>a- General Security Aspects. This catalog includes general information classified under the following headings:</title>
<list-item>
<p>QA (Security): the quality attribute affected by an attack, e.g., privacy.</p>
<p>Example attacks: some concrete examples of the type of attack.</p>
<p>Consequences for the agricultural industry: a description of the impact and consequences the attack may have on the agricultural industry.</p>
<p>Architectural layer involved: a list of the architectural layers that may be affected by the attack.</p>
<p>Layer definition: a description of the affected architectural layer.</p>
<p>Common problems: an explanation of some common problems caused by the attack.</p>
<p>Resources: a list of all the resources that may be involved in the attack.</p>
</list-item>
</list>
</p>
<p>
<list list-type="simple">
<title>b- Specific Attacks to QAs. This catalog includes more in-depth descriptions of specific attacks classified under the following headings:</title>
<list-item>
<p>QA (Security): the quality attribute(s) that may be affected by the attack.</p>
<p>Threats and attacks (1): a list of concrete examples of attacks whose targets are the same as for the main attacks.</p>
<p>Threats and attacks (2): a list of exploits related to the type of attack.</p>
<p>Description: a detailed description of the attack.</p>
<p>Mitigation mechanism: a description of the recommended mitigation protocols or algorithms to mitigate or counter-attack the former attack.</p>
<p>Keywords: a list of words that best describe the attack.</p>
<p>Comments: comments about the specific attack, such as alternative classifications and extra information related to the attack.</p>
</list-item>
</list>
</p>
<p>These catalogs are organized as tables, each heading corresponding to a column. Each row of the General Security Aspects catalog contains information about one quality attribute (e.g., privacy, confidentiality, etc.). Each row of the Specific Attacks catalog contains information about one specific type of related attack. <xref ref-type="fig" rid="gf4">Figure 4</xref> and<xref ref-type="fig" rid="gf5"> Figure 5</xref> show screenshots of the General Security Aspects catalog and the Specific Attacks catalog, respectively.</p>
<p>
<fig id="gf4">
<label>Figure 4.</label>
<caption>
<title>General Security Aspects catalog (screenshot).</title>
</caption>
<alt-text>Figure 4. General Security Aspects catalog (screenshot).</alt-text>
<graphic xlink:href="344276634005_gf8.png" position="anchor" orientation="portrait"/>
<attrib>
<bold> Source:</bold> Own work.</attrib>
</fig>
</p>
<p>
<fig id="gf5">
<label>Figure 5.</label>
<caption>
<title>Specific Attacks catalog (screenshot).</title>
</caption>
<alt-text>Figure 5.  Specific Attacks catalog (screenshot).</alt-text>
<graphic xlink:href="344276634005_gf9.png" position="anchor" orientation="portrait"/>
<attrib>
<bold>Source:</bold> Own work.</attrib>
</fig>
</p>
</sec>
<sec>
<title>
<bold>6.2 Scenario processing</bold>
</title>
<p>The operation of our prototype can be summarized as follows. First, keywords related to specific attacks are identified in existing scenarios (both correct and incorrect use scenarios). The catalogs are then searched for the keywords in order to locate the row containing an occurrence of the specific attack. Once the relevant row is identified in both catalogs, the following information is extracted: affected security QA, attack involved, mitigation mechanism, and consequences for the agricultural industry. The algorithm concatenates the information extracted from the catalogs and attaches it to a security scenario in a new field labelled <italic>threats</italic>. The user can use this information to derive more robust and precise security scenarios.</p>
<p>We expect that our prototype will help requirements engineers to complement correct and incorrect use scenarios for software applications. The following is a detailed description of the algorithm:</p>
<p>
<list list-type="simple">
<list-item>
<p>Step 0: Preprocessing (Tokenization and POS tagging). This step is carried out using spaCy’s open-source libraries. spaCy’s pre-trained language models are used to tokenize the document and assign POS (part-of-speech) tags to each token.</p>
<p>Step 1: Process scenarios looking for nouns and verbs. First, the document is processed to extract all nouns and verbs (the words concentrating the most important information). The nouns and verbs are lemmatized to obtain their root form. Also, the main subject is captured.</p>
<p>Step 2: Process catalogs looking for ADJ + NOUN sequences. First, keywords from the catalogs are captured using an external source. Then, the catalogs in CSV format are processed using spaCy’s libraries. spaCy’s matcher is used to extract ADJ + NOUN sequences from the catalogs. Matched sequences are filtered. Thus, only the most important matches are kept.</p>
<p>Step 3: Compare the outputs of Steps 1 and 2. Using the output of Step 2, we look for specific words in the output of Step 1 that have the same syntactic structure. That is, the words extracted from a scenario are checked against the words obtained from the CSV catalogs. The number of rows in the catalog where a match is found is counted. This count is stored in tuples (row, no. of matches).</p>
<p>Step 4: Find the row with most matches. The tuples are processed with a max function.</p>
<p>Step 5: Get the relevant information from the catalogs and fill in the scenario. The relevant information is extracted from the row with most matches and tagged as follows: affected QA, threats and attacks, affected layer, layer details, mitigation mechanisms, and impact. This information is then added to a draft of the security scenario, in a field labelled <italic>threats</italic>. The results of this process are shown in <xref ref-type="fig" rid="gf6">Figure 6</xref>.</p>
</list-item>
</list>
</p>
<p>
<fig id="gf6">
<label>Figure 6.</label>
<caption>
<title>App output.</title>
</caption>
<alt-text>Figure 6.  App output.</alt-text>
<graphic xlink:href="344276634005_gf10.png" position="anchor" orientation="portrait"/>
<attrib>
<bold>Source:</bold> Own work.</attrib>
</fig>
</p>
<p>The algorithm strengthens the incorrect use scenario (which is based on the correct use scenario), enabling the expert to complete the information for the analysis and subsequent derivation of the security scenario.</p>
</sec>
</sec>
<sec>
<title>
<bold>7. DISCUSSION</bold>
</title>
<p>[<xref ref-type="bibr" rid="redalyc_344276634005_ref25">25</xref>] proposed FRASAD, a model-driven software development framework to manage the complexity of IoT applications. [<xref ref-type="bibr" rid="redalyc_344276634005_ref26">26</xref>] proposed another approach to deal with said complexity. Their approach includes activities such as requirements development, domain-specific design, verification, simulation, analysis, calibration, deployment, code generation, and execution [<xref ref-type="bibr" rid="redalyc_344276634005_ref28">28</xref>] presented a taxonomy of security requirements to be considered when a software application is designed and implemented.[<xref ref-type="bibr" rid="redalyc_344276634005_ref19">19</xref>] proposed a security architecture to provide security-enabled IoT services and a baseline for security deployment. [<xref ref-type="bibr" rid="redalyc_344276634005_ref29">29</xref>] established security requirements for IoT systems and focused on enhancing the security of smart home applications.[<xref ref-type="bibr" rid="redalyc_344276634005_ref30">30</xref>] presented a comprehensive literature review of IoT security requirements [<xref ref-type="bibr" rid="redalyc_344276634005_ref33">33</xref>] presented an approach to specify security requirements for IoT applications. They combined a framework for requirement elicitation with automated reasoning to provide secure IoT for vulnerable users in healthcare scenarios. They mapped technical system requirements using high-level logical modelling.</p>
<p>The proposals mentioned in the <italic>Related Work</italic> section enrich our proposal and complement it in different areas such as the following. (i) The architectural solution outlined in [<xref ref-type="bibr" rid="redalyc_344276634005_ref19">19</xref>] plays a crucial role in this study because it addresses the security requirements of IoT systems. These security requirements are useful components of our security scenarios proposal. By focusing on these requirements, we can effectively establish a robust security framework at the requirements level. (ii) The requirements identified in [<xref ref-type="bibr" rid="redalyc_344276634005_ref19">29</xref>] complement our proposal as they introduce significant terminology for describing security scenarios in the context of IoT and smart farming. by incorporating these elicited requirements, we can effectively address the specific security challenges and other considerations associated with IoT and smart farming environments.</p>
<p>Although the related works contributed to our research, there are general and specific differences between our study and the proposals mentioned above. (i) None of these proposals has considered security, which is our main concern [<xref ref-type="bibr" rid="redalyc_344276634005_ref25">25</xref>], [<xref ref-type="bibr" rid="redalyc_344276634005_ref26">26</xref>]. (ii) Some other approaches have indeed considered the security issue, but in terms of implementation, whereas our proposal considers security in terms of requirements specification. (iii) A number of approaches have considered security among software requirements, but they have not addressed how to specify security requirements precisely. (iv) [<xref ref-type="bibr" rid="redalyc_344276634005_ref30">30</xref>] presented a comprehensive literature review of IoT security requirements, but they did not include any references on how to specify them. (v) [<xref ref-type="bibr" rid="redalyc_344276634005_ref33">33</xref>] presented an approach to specify security requirements for IoT applications, but their work concentrated on attack tree analysis to identify the situation. In contrast, our approach focuses on how to describe security requirements precisely.</p>
<p>Considering the previous findings that support our proposal and the differences found in related works, we present a lightweight approach to requirement specifications that begins with a description of functional requirements. The misuse of the application is specified in order to design countermeasures to deal with it. This study also describes a prototype tool that helps to apply the proposed approach. Finally, a preliminary assessment is provided. In the survey administered to five security experts, it was found that the proposed security scenario method is generally useful for specifying agricultural IoT solutions but needs improvement in different areas.</p>
<p>The experts commented that the approach still needs to be more specific and interactive for users to remember its steps. They also suggested incorporating more specific and accurate cybersecurity aspects, vulnerabilities, and risks commonly found in IoT systems, as well as different types of common and malicious users. These results provided valuable feedback for refining and improving the method in order to fulfil user needs and enhance security aspects.</p>
<p>Currently, the most widely used software development methodology is agile development. However, we propose a different, complementary, and lightweight technique made specifically for IoT applications in smart farming. The prototype tool and the algorithm described in this paper can strengthen and refine incorrect use scenarios based on correct use scenarios, enabling experts to add more information for the analysis and subsequent derivation of the security scenario.</p>
</sec>
<sec>
<title>
<bold>8. CONCLUSIONS</bold>
</title>
<p>This paper proposed a novel approach to describing security scenarios that can be used to design robust software architectures for IoT technologies in the agricultural field. Developers of IoT applications should be concerned about security (and some other non-functional requirements) since the risk of exposing physical artifacts to intruders is considerable in this area. Moreover, it is difficult to identify the threat and design a countermeasure. Generally, these issues are identified when it is too late, when some intruder exploits the vulnerability.</p>
<p>Therefore, this paper presented a lightweight approach that begins with a description of the functional requirements. The misuse of the application is then identified in order to design countermeasures to deal with it. This paper also described a prototype tool to help apply the proposed approach. The method is composed of four essential steps: (i) describe scenarios for the intended software application, (ii) describe scenarios related to the previous ones but referring to an incorrect use of the application, (iii) apply a set of rules to map attributes from the previous scenarios to the architectural scenarios, and (iv) describe the architectural scenarios in more detail. Additionally, a preliminary assessment of this method was also conducted.</p>
<p>The survey applied to five security experts found that the proposed security scenario method is generally useful for specifying agricultural IoT solutions but needs improvement in certain areas. Experts suggested incorporating specific cybersecurity aspects, vulnerabilities, and risks commonly found in IoT systems, as well as different types of users and adversaries. They also noted that the method needs to be more specific and interactive for users to remember its steps. The results provided valuable insights for refining and improving the method in order to meet user needs and enhance security.</p>
<p>Currently, the most widely used software development methodology is agile development. However, we propose a complementary and lightweight technique specifically for IoT applications in smart farming. In future studies, we aim to enrich our proposal with additional guidelines for writing scenarios at each stage. Additionally, further experimentation is necessary before we make the approach more complex. Nevertheless, we firmly believe that our approach can be improved and made more robust.</p>
<p>The tool and this algorithm can strengthen incorrect use scenarios (which are based on correct use scenarios), enabling experts to complete the information for the analysis and subsequent derivation of security scenarios.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="redalyc_344276634005_ref1">
<label>[1]</label>
<mixed-citation>[1] ITU-T. “Overview of internet of things.” 2012. [Online]. Available: https://www.itu.int/rec/T-REC-Y.2060/en</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>ITU-T.</collab>
</person-group>
<source>Overview of internet of things</source>
<year>2012</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref2">
<label>[2]</label>
<mixed-citation>[2] K. Ojo-Gonzalez, and B. Bonilla-Morales, “Requerimientos no funcionales para sistemas basados en el internet de las cosas (IoT): Una revisión,”<italic> I+D Tecnológico</italic>, vol. 17, no. 2, Jul. 2021. https://doi.org/10.33412/idt.v17.2.3303</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ojo-Gonzalez</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Bonilla-Morales</surname>
<given-names>B.</given-names>
</name>
</person-group>
<article-title>Requerimientos no funcionales para sistemas basados en el internet de las cosas (IoT): Una revisión</article-title>
<source>I+D Tecnológico</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref3">
<label>[3]</label>
<mixed-citation>[3] Berkeley CPS Publications. “<italic>Cyber-Physical Systems (CPS)</italic>.” Berkeley.edu. Accessed: Sep. 20, 2023. [Online]. Available: https://ptolemy.berkeley.edu/projects/cps/</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Berkeley CPS Publications</collab>
</person-group>
<source>“Cyber-Physical Systems (CPS).</source>
<year>2023</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref4">
<label>[4]</label>
<mixed-citation>[4] P. Shankar, B. Morkos, D. Yadav, and J. D. Summers, “Towards the formalization of non-functional requirements in conceptual design,” <italic>Res. Eng. Des.</italic>, vol. 31, no. 4, pp. 449–469, Oct. 2020. https://doi.org/10.1007/s00163-020-00345-6</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shankar</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Morkos</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Yadav</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Summers</surname>
<given-names>J. D.</given-names>
</name>
</person-group>
<article-title>Towards the formalization of non-functional requirements in conceptual design</article-title>
<source>Res. Eng. Des.</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref5">
<label>[5]</label>
<mixed-citation>[5] E. Serna M., and A. Serna A., “Process and progress of requirement formalization in software engineering,” Ingeniare, Rev. Chil. Ing., vol. 28, no. 3, pp. 411–423, Sep. 2020. https://doi.org/10.4067/S0718-33052020000300411</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Serna M.</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Serna A.</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Process and progress of requirement formalization in software engineering</article-title>
<source>Ingeniare, Rev. Chil. Ing.</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref6">
<label>[6]</label>
<mixed-citation>[6] U. Ahmed, “A review on khowledge management in requirements engineering,” in <italic>International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan</italic>, 2018, pp. 1-5. https://doi.org/10.1109/ICEET1.2018.8338650</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ahmed</surname>
<given-names>U.</given-names>
</name>
</person-group>
<source>International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref7">
<label>[7]</label>
<mixed-citation>[7] C. Potts, “Using schematic scenarios to understand user needs,” in<italic> Proceedings of the conference on Designing interactive systems processes, practices, methods, &amp; techniques - DIS ’95</italic>, New York, Aug. 1995, pp. 247–256. https://doi.org/10.1145/225434.225462</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Potts</surname>
<given-names>C.</given-names>
</name>
</person-group>
<source>Proceedings of the conference on Designing interactive systems processes, practices, methods, &amp; techniques - DIS ’95</source>
<year>1995</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref8">
<label>[8]</label>
<mixed-citation>[8] J. Patton, and P. <italic>Economy, User Story Mapping: Discover the Whole Story, Build the Right Product</italic>, 1st Ed. Sebastopol, CA, United States of America: O’Reilly Media, 2014.</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Patton</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Economy</surname>
<given-names>P.</given-names>
</name>
</person-group>
<source>User Story Mapping: Discover the Whole Story, Build the Right Product</source>
<year>2014</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref9">
<label>[9]</label>
<mixed-citation>[9] J. R. Price, <italic>Write a Use Case: Gathering Requirements that Users Understand, The Communication Circle</italic>, 2020.</mixed-citation>
<element-citation publication-type="other">
<person-group person-group-type="author">
<name>
<surname>Price</surname>
<given-names>J. R.</given-names>
</name>
</person-group>
<source>Write a Use Case: Gathering Requirements that Users Understand, The Communication Circle</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref10">
<label>[10]</label>
<mixed-citation>[10] J. M. Carroll, “Five reasons for scenario-based design,” in <italic>Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers</italic>, Maui, HI, USA, Jan. 1999, pp. 11. https://doi.org/10.1109/hicss.1999.772890</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Carroll</surname>
<given-names>J. M.</given-names>
</name>
</person-group>
<source>Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers</source>
<year>1999</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref11">
<label>[11]</label>
<mixed-citation>[11] S. Hofer, and H. Schwentner, <italic>Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software (Addison-Wesley Signature Series (Vernon))</italic>, 1st Ed. Massachusetts, United States Of America: Addison-Wesley Professional, 2021.</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Hofer</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Schwentner</surname>
<given-names>H.</given-names>
</name>
</person-group>
<source>Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software (Addison-Wesley Signature Series (Vernon))</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref12">
<label>[12]</label>
<mixed-citation>[12] S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, “Security requirements for the internet of things: A systematic approach,” <italic>Sensors</italic>, vol. 20, no. 20, p. 5897, Oct. 2020. https://doi.org/10.3390/s20205897</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pal</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hitchens</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Rabehaja</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Mukhopadhyay</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Security requirements for the internet of things: A systematic approach</article-title>
<source>Sensors</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref13">
<label>[13]</label>
<mixed-citation>[13] S. Myagmar, A. J. Lee, and W. Yurcik, “Threat Modeling as a Basis for Security Requirements,” <italic>ResearchGate</italic>, Aug. 2005. [Online]. Available: https://www.researchgate.net/publication/228634178_Threat_Modeling_as_a_Basis_for_Security_Requirements</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Myagmar</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>A. J.</given-names>
</name>
<name>
<surname>Yurcik</surname>
<given-names>W.</given-names>
</name>
</person-group>
<source>ResearchGate</source>
<year>2005</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref14">
<label>[14]</label>
<mixed-citation>[14] B. Schneier, “Cryptography Is Harder than It Looks,” <italic>IEEE Secur. Priv.</italic>, vol. 14, no. 1, pp. 87–88, Jan.-Feb. 2016. https://doi.org/10.1109/MSP.2016.7</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schneier</surname>
<given-names>B.</given-names>
</name>
</person-group>
<article-title>Cryptography Is Harder than It Looks</article-title>
<source>IEEE Secur. Priv.</source>
<year>2016</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref15">
<label>[15]</label>
<mixed-citation>[15] T. Martin, D. Geneiatakis, I. Kounelis, S. Kerckhof, and I. N. Fovino, “Towards a formal lot security model,” <italic>Symmetry</italic>, vol. 12, no. 8, p. 1305, Aug. 2020.https://doi.org/10.3390/sym12081305</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Martin</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Geneiatakis</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kounelis</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Kerckhof</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Fovino</surname>
<given-names>I. N.</given-names>
</name>
</person-group>
<article-title>Towards a formal lot security model</article-title>
<source>Symmetry</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref16">
<label>[16]</label>
<mixed-citation>[16] M. Dhanaraju, P. Chenniappan, K. Ramalingam, S. Pazhanivelan, and R. Kaliaperumal, “Smart Farming: Internet of Things (IoT)-Based Sustainable Agriculture,” <italic>Agriculture</italic>, vol. 12, no. 10, p. 1745, Oct. 2022. https://doi.org/10.3390/agriculture12101745</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dhanaraju</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chenniappan</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Ramalingam</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Pazhanivelan</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Kaliaperumal</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Smart Farming: Internet of Things (IoT)-Based Sustainable Agriculture</article-title>
<source>Agriculture</source>
<year>2022</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref17">
<label>[17]</label>
<mixed-citation>[17] N. Khan, R. L. Ray, G. R. Sargani, M. Ihtisham, M. Khayyam, and S. Ismail, “Current progress and future prospects of agriculture technology: Gateway to sustainable agriculture,” <italic>Sustainability</italic>, vol. 13, no. 9, p. 4883, Apr. 2021. https://doi.org/10.3390/su13094883</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Khan</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Ray</surname>
<given-names>R. L.</given-names>
</name>
<name>
<surname>Sargani</surname>
<given-names>G. R.</given-names>
</name>
<name>
<surname>Ihtisham</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Khayyam</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Ismail</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Current progress and future prospects of agriculture technology: Gateway to sustainable agriculture</article-title>
<source>Sustainability</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref18">
<label>[18]</label>
<mixed-citation>[18] D. C. Rose, R. Wheeler, M. Winter, M. Lobley, and C. Charlotte-Anne, “Agriculture 4.0: Making it work for people, production, and the planet,”<italic> Land use policy</italic>, vol. 100, p. 104933, Jan. 2021. https://doi.org/10.1016/j.landusepol.2020.104933</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rose</surname>
<given-names>D. C.</given-names>
</name>
<name>
<surname>Wheeler</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Agriculture 4.0: Making it work for people, production, and the planet</article-title>
<source>Land use policy</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref19">
<label>[19]</label>
<mixed-citation>[19] S. El-Gendy, and M. A. Azer, “Security Framework for Internet of Things (IoT),” in <italic>2020 15th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt</italic>, 2020, pp. 1-6. https://doi.org/10.1109/ICCES51560.2020.9334589</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>El-Gendy</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Azer</surname>
<given-names>M. A.</given-names>
</name>
</person-group>
<source>2020 15th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref20">
<label>[20]</label>
<mixed-citation>[20] A. Rettore de Araujo Zanella, E. da Silva, and L. C. Pessoa Albini, “Security challenges to smart agriculture: Current state, key issues, and future directions,” <italic>Array</italic>, vol. 8, p. 100048, Dec. 2020. https://doi.org/10.1016/j.array.2020.100048</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rettore de Araujo Zanella</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>da Silva</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Pessoa Albini</surname>
<given-names>L. C.</given-names>
</name>
</person-group>
<article-title>Security challenges to smart agriculture: Current state, key issues, and future directions</article-title>
<source>Array</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref21">
<label>[21]</label>
<mixed-citation>[21] A. Yazdinejad et al., “A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures,” <italic>Applied Sciences</italic>, vol. 11, no. 16, Aug. 2021. https://doi.org/10.3390/app11167518</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yazdinejad</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures</article-title>
<source>Applied Sciences</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref22">
<label>[22]</label>
<mixed-citation>[22] K. Demestichas, N. Peppes, and T. Alexakis, “Survey on Security Threats in Agricultural IoT and Smart Farming,” sensors, vol. 20, no. 22, p. 6458, Nov. 2020. https://doi.org/10.3390/s20226458</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Demestichas</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Peppes</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Alexakis</surname>
<given-names>T.</given-names>
</name>
</person-group>
<article-title>Survey on Security Threats in Agricultural IoT and Smart Farming</article-title>
<source>sensors</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref23">
<label>[23]</label>
<mixed-citation>[23] J. C. Sampaio Do Prado Leite, G. D. S. Hadad, J. H. Doorn, and G. N. Kaplan, “A scenario construction process,” <italic>Requir. Eng.</italic>, vol. 5, no. 1, pp. 38–61, Jul. 2000. https://doi.org/10.1007/pl00010342</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sampaio Do Prado Leite</surname>
<given-names>J. C.</given-names>
</name>
<name>
<surname>Hadad</surname>
<given-names>G. D. S.</given-names>
</name>
<name>
<surname>Doorn</surname>
<given-names>J. H.</given-names>
</name>
<name>
<surname>Kaplan</surname>
<given-names>G. N.</given-names>
</name>
</person-group>
<article-title>A scenario construction process</article-title>
<source>Requir. Eng.</source>
<year>2000</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref24">
<label>[24]</label>
<mixed-citation>[24] S. Khamaiseh, and D. Xu, “Software security testing via misuse case modeling,” in <italic>2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress</italic>, <italic>Orlando, FL, USA, 2017</italic>, pp. 534-541. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.98</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Khamaiseh</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>D.</given-names>
</name>
</person-group>
<source>2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, Orlando, FL, USA, 2017</source>
<year>2017</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref25">
<label>[25]</label>
<mixed-citation>[25] X. T. Nguyen, H. T. Tran, H. Baraki, and K. Geihs, “Frasad: A Framework for Model-driven IoT Application Development Xuan,” in <italic>2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 2015</italic>, pp. 387-392. https://doi.org/10.1109/WF-IoT.2015.7389085</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Nguyen</surname>
<given-names>X. T.</given-names>
</name>
<name>
<surname>Tran</surname>
<given-names>H. T.</given-names>
</name>
<name>
<surname>Baraki</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Geihs</surname>
<given-names>K.</given-names>
</name>
</person-group>
<source>2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy</source>
<year>2015</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref26">
<label>[26]</label>
<mixed-citation>[26] B. Karaduman, S. Mustafiz, and M. Challenger, “FTG+PM for the Model-Driven Development of Wireless Sensor Network based IoT Systems,” in <italic>2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, Japan, 2021</italic>, pp. 306-316. https://doi.org/10.1109/MODELS-C53483.2021.00052</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Karaduman</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Mustafiz</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Challenger</surname>
<given-names>M.</given-names>
</name>
</person-group>
<source>2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, Japan, 2021</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref27">
<label>[27]</label>
<mixed-citation>[27] H. Cardenas, R. Zimmerman, A. R. Viesca, M. Al Lail, and A. J. Perez, "Formal UML-based Modeling and Analysis for Securing Location-based IoT Applications," in <italic>2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Denver, CO, USA, 2022</italic>, pp. 722-723. https://doi.org/10.1109/MASS56207.2022.00109</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Cardenas</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zimmerman</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Viesca</surname>
<given-names>A. R.</given-names>
</name>
<name>
<surname>Al Lail</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Perez</surname>
<given-names>A. J.</given-names>
</name>
</person-group>
<source>2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Denver, CO, USA, 2022</source>
<year>2022</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref28">
<label>[28]</label>
<mixed-citation>[28] K. Slovenec, M. Vuković, D. Salopek, and M. Mikuc, "Securing IoT Services Based on Security Requirement Categories," in <italic>2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2022</italic>, pp. 1-6. https://doi.org/10.23919/SoftCOM55329.2022.9911319</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Slovenec</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Vuković</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Salopek</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Mikuc</surname>
<given-names>M.</given-names>
</name>
</person-group>
<source>2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2022</source>
<year>2022</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref29">
<label>[29]</label>
<mixed-citation>[29] S. Sotoudeh, S. Hashemi, and H. G. Garakani, Security Framework of IoT-Based Smart Home," in <italic>2020 10th International Symposium on Telecommunications (IST), Tehran, Iran, 2020</italic>, pp. 251-256. https://doi.org/10.1109/IST50524.2020.9345886</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Sotoudeh</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hashemi</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Garakani</surname>
<given-names>H. G.</given-names>
</name>
</person-group>
<source>2020 10th International Symposium on Telecommunications (IST), Tehran, Iran, 2020</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref30">
<label>[30]</label>
<mixed-citation>[30] W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, “An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security,”<italic> IEEE Internet Things J.</italic>, vol. 7, no. 10, pp. 10250–10276, Oct. 2020. https://doi.org/10.1109/JIOT.2020.2997651</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Iqbal</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Abbas</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Daneshmand</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Rauf</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Bangash</surname>
<given-names>Y. A.</given-names>
</name>
</person-group>
<article-title>An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security</article-title>
<source>IEEE Internet Things J.</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref31">
<label>[31]</label>
<mixed-citation>[31] Ö. Özkaya, and B. Örs, "Model based node design methodology for secure IoT applications," in <italic>2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey</italic>, 2018, pp. 1-4. https://doi.org/10.1109/SIU.2018.8404490</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Özkaya</surname>
<given-names>Ö.</given-names>
</name>
<name>
<surname>Örs</surname>
<given-names>B.</given-names>
</name>
</person-group>
<source>2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey, 2018</source>
<year>2018</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref32">
<label>[32]</label>
<mixed-citation>[32] R. M. Carvalho, "Dealing with Conflicts Between Non-functional Requirements of UbiComp and IoT Applications," in <italic>2017 IEEE 25th International Requirements Engineering Conference (RE), Lisbon, Portugal, 2017</italic>, pp. 544-549. https://doi.org/10.1109/RE.2017.51</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Carvalho</surname>
<given-names>R. M.</given-names>
</name>
</person-group>
<source>2017 IEEE 25th International Requirements Engineering Conference (RE), Lisbon, Portugal</source>
<year>2017</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref33">
<label>[33]</label>
<mixed-citation>[33] F. Kammuller, J. C. Augusto, and S. Jones, “Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle,” in <italic>2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), London, UK, 2017</italic>, pp. 401-406. https://doi.org/10.1109/SERA.2017.7965758</mixed-citation>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Kammuller</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Augusto</surname>
<given-names>J. C.</given-names>
</name>
<name>
<surname>Jones</surname>
<given-names>S.</given-names>
</name>
</person-group>
<source>2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), London, UK, 2017</source>
<year>2017</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref34">
<label>[34]</label>
<mixed-citation>[34] M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities,” <italic>IEEE Access</italic>, vol. 8, pp. 34564–34584, Feb. 2020. https://doi.org/10.1109/ACCESS.2020.2975142</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gupta</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Abdelsalam</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Khorsandroo</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Mittal</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Security and Privacy in Smart Farming: Challenges and Opportunities</article-title>
<source>IEEE Access</source>
<year>2020</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref35">
<label>[35]</label>
<mixed-citation>[35] F. Davis, “<italic>User Acceptance of Information Systems: Technology acceptance model (TAM)</italic>,” University of Michigan, Ann Arbor, Michigan. [Online]. Available: https://deepblue.lib.umich.edu/bitstream/handle/2027.42/35547/b1409190.0001.001.pdf?seque</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Davis</surname>
<given-names>F.</given-names>
</name>
</person-group>
<source>User Acceptance of Information Systems: Technology acceptance model (TAM)</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref36">
<label>[36]</label>
<mixed-citation>[36] N. Marangunić, and A. Granić, “Technology acceptance model: a literature review from 1986 to 2013,” Univers. Access Inf. Soc., vol. 14, pp. 81–95, Mar. 2015. https://doi.org/10.1007/s10209-014-0348-1</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marangunić</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Granić</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Technology acceptance model: a literature review from 1986 to 2013</article-title>
<source>Univers. Access Inf. Soc.</source>
<year>2015</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref37">
<label>[37]</label>
<mixed-citation>[37] Python. (1995). <italic>Netherlands</italic>. Accessed: Sep. 20, 2023. [Online]. Available: https://www.python.org/</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<collab>Python</collab>
</person-group>
<article-title>Netherlands</article-title>
<source>Netherlands</source>
<year>2015</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref38">
<label>[38]</label>
<mixed-citation>[38] Spacy. <italic>Industrial-Strength Natural Language Processing.</italic> (2016). Accessed: Sep. 20, 2023. [Online]. Available: https://spacy.io/</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Spacy.</collab>
</person-group>
<source>Industrial-Strength Natural Language Processing.</source>
<year>2016</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref39">
<label>[39]</label>
<mixed-citation>[39] S. Loria. Textblob (Python). (2023). Accessed: Sep. 23, 2023. [Online]. Available: https://pypi.org/project/textblob/</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Loria</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Textblob (Python). (2023)</article-title>
<source>Textblob (Python).</source>
<year>2023</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref40">
<label>[40]</label>
<mixed-citation>[40] S. Aurangzeb, M. Aleem, M. Azhar Iqbal, and M. Arshad Islam, “Ransomware: A Survey and Trends,” <italic>Journal of Information Assurance and Security</italic>, vol. 12, Jun. 2017. https://www.researchgate.net/publication/317380115_Ransomware_A_Survey_and_Trends</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aurangzeb</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Aleem</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Azhar Iqbal</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Arshad Islam</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>Ransomware: A Survey and Trends</article-title>
<source>Journal of Information Assurance and Security</source>
<year>2017</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref41">
<label>[41]</label>
<mixed-citation>[41] S. G. Abbas et al., “Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach,” <italic>Sensors</italic>, vol. 21, no. 14, p. 4816, Jul. 2021. https://doi.org/10.3390/s21144816</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abbas</surname>
<given-names>S. G.</given-names>
</name>
</person-group>
<article-title>Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach</article-title>
<source>Sensors</source>
<year>2021</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref42">
<label>[42]</label>
<mixed-citation>[42] L. Chang, “<italic>A Proactive Approach to Detect IoT Based Flooding Attacks by Using Software Defined Networks and Manufacturer Usage Descriptions,</italic>” M.S thesis, Arizona State University Tempe Campus, EE. UU. 2018. [Online]. Available: https://core.ac.uk/download/pdf/161995314.pdf</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Chang</surname>
<given-names>L.</given-names>
</name>
</person-group>
<source>A Proactive Approach to Detect IoT Based Flooding Attacks by Using Software Defined Networks and Manufacturer Usage Descriptions</source>
<year>2018</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref43">
<label>[43]</label>
<mixed-citation>[43] J. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and Access Control in the Internet of Things," in <italic>2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China</italic>, 2012, pp. 588-592. https://doi.org/10.1109/ICDCSW.2012.23</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>C. L. P.</given-names>
</name>
</person-group>
<source>2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China</source>
<year>2012</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref44">
<label>[44]</label>
<mixed-citation>[44] Q. M. Ashraf, and M. H. Habaebi, “Autonomic schemes for threat mitigation in Internet of Things,” <italic>J. Netw. Comput. Appl.</italic>, vol. 49, pp. 112–127, 2015. https://doi.org/10.1016/j.jnca.2014.11.011</mixed-citation>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ashraf</surname>
<given-names>Q. M.</given-names>
</name>
<name>
<surname>Habaebi</surname>
<given-names>M. H.</given-names>
</name>
</person-group>
<article-title>Autonomic schemes for threat mitigation in Internet of Things</article-title>
<source>J. Netw. Comput. Appl.</source>
<year>2015</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref45">
<label>[45]</label>
<mixed-citation>[45] J. Deogirikar, and A. Vidhate, “Security attacks in IoT: A survey,” in <italic>2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017</italic>, pp. 32-37. https://doi.org/10.1109/I-SMAC.2017.8058363</mixed-citation>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Deogirikar</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Vidhate,</surname>
<given-names>A.</given-names>
</name>
</person-group>
<source>2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017</source>
<year>2017</year>
</element-citation>
</ref>
<ref id="redalyc_344276634005_ref46">
<label>[46]</label>
<mixed-citation>[46] Decisioning, “The second workshop on Collaboration in knowledge discovery and decision making.”<italic> unicauca.edu.co</italic>. Accessed: Sep. 23, 2023. [Online]. Available: https://www.unicauca.edu.co/versionP/eventos/conversatorio/decisioning-2023-second-workshop-collaboration-knowledge-discovery-and-decision-making</mixed-citation>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Decisioning</collab>
</person-group>
<source>unicauca.edu.co</source>
<year>2023</year>
<comment>https://www.unicauca.edu.co/versionP/eventos/conversatorio/decisioning-2023-second-workshop-collaboration-knowledge-discovery-and-decision-making</comment>
</element-citation>
</ref>
</ref-list>
<fn-group>
<title>Notes</title>
<fn id="fn1" fn-type="other">
<label>
<bold>9. ACKNOWLEDGEMENT AND FUNDING</bold>
</label>
<p>:</p>
<p>This study was partially funded by the STIC AmSud program (project code 22STIC-01). All authors declare that they have no conflicts of interest.</p>
</fn>
<fn id="fn12" fn-type="other">
<label>
<bold>CONFLICTS OF INTEREST</bold>
</label>
<p>:</p>
</fn>
<fn id="fn2" fn-type="other">
<label>.</label>
<p>
<bold>The authors declare that there is no conflict of interest.</bold>
</p>
</fn>
<fn id="fn3" fn-type="other">
<label>
<bold>AUTHOR CONTRIBUTIONS</bold>
</label>
<p>:</p>
<p>
<bold>- Julio Ariel Hurtado: </bold>Conceptualization, Supervision.</p>
<p>- <bold>Leandro Antonelli: </bold>Conceptualization, Supervision.</p>
<p>- <bold>Santiago López:</bold> Methodology, Investigation, Resources, Writing - Review and Editing, Validation.</p>
<p>- <bold>Adriana Gómez: </bold>Methodology, Investigation, Resources; Writing - Review and Editing, Validation.</p>
<p>- <bold>Juliana Delle Ville: </bold>Methodology, Investigation, Resources, Writing - Review and Editing, Validation.</p>
<p>- <bold>Giuliana Maltempo: </bold>Methodology, Investigation, Resources, Writing - Review and Editing, Validation.</p>
<p>- <bold>Frey Giovanny Zambrano:</bold> Validation, Writing - Review and Editing.</p>
<p>- <bold>Andrés Solis: </bold>Investigation, Writing - Review and Editing.</p>
<p>-<bold> Marta Cecilia Camacho:</bold> Validation, Writing - Review and Editing.</p>
<p>-<bold> Miguel Solinas:</bold> Writing - Review and Editing.</p>
<p>- <bold>Gladys Kaplan: </bold>Writing - Review and Editing.</p>
<p>- <bold>Freddy Muñoz:</bold> Investigation, Writing - Review and Editing</p>
</fn>
</fn-group>
</back>
</article>