A Comparison of UAF and SysML-Based DODAF Implementations for Cybersecurity Architecture Modeling

Christopher Green

Abstract


IoT systems with constrained resources are moving towards energy harvesting to ensure sustainable and autonomous operations in resource-limited environments. Yet, incorporating energy harvesting in such a system involves intricate dependencies between energy production, energy storage capabilities, system operation, security controls, and availability considerations at a mission level. Current practices focus on analyzing the mentioned dependencies for individual components/subsystems without accounting for potential cross-domain effects, thus leaving open room for potential errors in system-level integration. In this paper, we propose an architecture-driven approach for integrating energy harvesting based on the Unified Architecture Framework (UAF). Energy availability is considered from the perspective of a system-level architectural constraint within a framework based on a meta-model, instead of being just a design consideration. Capabilities, operations, resources, security, and standards-related concepts are materialized within a common semantic baseline to enable cross-domain traceability of the dependencies between energy, security, and missions. Variability in the energy produced by the energy harvesters propagates through operations, communications, and security controls up to capabilities realization and availability. This technique takes advantage of the relationships between domains provided by the UAF Domain MetaModel to achieve structured dependency propagation and systematic trade-space analysis between domains. It is clear from the findings that integrating energy and cybersecurity elements into a single architectural framework helps minimize fragmentation in integration, enhances system-level reasoning, and facilitates energy-conscious co-design of operations and security functions.


Keywords


Cybersecurity; Department of Defense Architecture Framework (DODAF); Unified Architecture Framework (UAF); Model-Based Systems Engineering (MBSE); Digital Engineering

Full Text:

PDF

References


Adejokun, A. P., Hause, M., Brooks, M., & Huang, L. (2023). Preserving and sharing knowledge: Extending the UAF security views with libraries, patterns, and profiles. INCOSE International Symposium.

Boardman, J., & Sauser, B. (2008). System of Systems Engineering: Innovations for the 21st Century. CRC Press.

Brooks, M., & Hause, M. (2022). Making the Puzzle Pieces Fit: Utilizing UAF To Model A Cybersecurity System of Systems. INCOSE International Symposium.

Brooks, M., & Hause, M. (2023). Model-Based Cyber Security at the Enterprise and Systems Level. INCOSE International Symposium.

Department of Defense (DOD). (2010). Department of Defense Architecture Framework (DoDAF) version 2.02. U.S. Department of Defense.

Department of Defense. (2018). DoD Digital Engineering Strategy. U.S. Department of Defense.

https://www.acq.osd.mil/asda/dse/docs/DOD-Digital-Engineering-Strategy.pdf

Ding, Q., Wang, Y., & Cao, G. (2020). UAF Model Verification Method Based on Description Logic. IOP Conference Series: Materials Science and Engineering, 768(7), 072006.

Eichmann, O. C., Melzer, S., & God, R. (2019). Model-Based Development of a System-Of-Systems Using Unified Architecture Framework (UAF): A Case Paper. In 2019, the IEEE International Symposium on Systems Engineering (ISSE). IEEE.

Feng, Y., Ge, P., Shao, Y., Zou, Q., & Liu, Y. (2025). UAF-based Integration of Design And Simulation Model for System-Of-Systems. Journal of Systems Engineering and Electronics, 36(1), 108–126.

Hause, M. (2019). What Is UAF, And Why Do I Care? Object Management Group.

Hause, M. (2025). Using The Security Views In UAF. Object Management Group.

Hause, M., & Kihlström, H. (2021). Preserving and Sharing Knowledge: Extending The UAF Security Views with Libraries, Patterns, And Profiles. INCOSE International Symposium.

International Council on Systems Engineering (INCOSE). (2007). Systems Engineering Vision 2020. INCOSE.

International Organization for Standardization (ISO). (2013). ISO/IEC 27001:2013: Information Technology—Security Techniques—Information Security Management Systems—Requirements. ISO.

Lee, E. A. (2008). Cyber-Physical Systems: Design challenges. In Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC) (pp. 363–369). IEEE. https://doi.org/10.1109/ISORC.2008.25

Maier, M. W. (1998). Architecting Principles for Systems-of-Systems. Systems Engineering, 1(4), 267–284. https://doi.org/10.1002/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D

Martin, J.N. & Brookshier, D. (2023). Linking UAF and SysML Models: Achieving Alignment Between Enterprise and System Architectures. INCOSE International Symposium, 33: 1132–1155. https://doi.org/10.1002/iis2.13074

Mažeika, D. (2021). Integrating Security Into Model-Based Systems Engineering Environments. Systems Engineering, 24(5), 375–389.

National Institute of Standards and Technology. (2020). Security And Privacy Controls For Information Systems And Organizations (NIST SP 800-53 Rev. 5). U.S. Department of Commerce.

Object Management Group. (2021). Unified Architecture Framework (UAF) version 1.2 (ISO/IEC 19540). OMG.




DOI: https://doi.org/10.53889/citj.v4i1.854

Article Metrics

Abstract view : 6 times
PDF - 1 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2026 Cybersecurity and Innovative Technology Journal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.