A Model-based Security Toolkit for the Internet of Things

被引:14
|
作者
Neisse, Ricardo [1 ]
Fovino, Igor Nai [1 ]
Baldini, Gianmarco [1 ]
Stavroulaki, Vera [2 ]
Vlacheas, Panagiotis [2 ]
Giaffreda, Raffaele [3 ]
机构
[1] European Commiss Joint Res Ctr, Ispra, Italy
[2] Univ Piraeus, Piraeus, Greece
[3] CREATE NET, Trento, Italy
关键词
Security; Management; Internet of Things; FRAMEWORK;
D O I
10.1109/ARES.2014.17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The control and protection of user data is a very important aspect in the design and deployment of the Internet of Things (IoT). The heterogeneity of the IoT technologies, the number of the participating devices and systems, and the different types of users and roles create important challenges in the IoT context. In particular, requirements of scalability, interoperability and privacy are difficult to address even with the considerable amount of existing work both in the research and standardization community. In this paper we propose a Model-based Security Toolkit, which is integrated in a management framework for IoT devices, and supports specification and efficient evaluation of security policies to enable the protection of user data. Our framework is applied to a Smart City scenario in order to demonstrate its feasibility and performance.
引用
收藏
页码:78 / 87
页数:10
相关论文
共 50 条
  • [31] RFID Security Certification based on the Internet of Things
    Zhang, Meng
    Zhao, Zhen-Yu
    Yu, Song-Sen
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 755 - 760
  • [32] Security of the Internet of Things Based on Game Algorithm
    Yi, Yue-e
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (08) : 80 - 93
  • [33] Biometric security management based on Internet of Things
    Sesha Vidhya S.
    Shanthi K.G.
    Keerthana S.
    Nisha P.
    Monisha H.
    Nandhini Devi G.
    [J]. Materials Today: Proceedings, 2023, 80 : 3204 - 3207
  • [34] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [35] Examination on Security Performance Analysis Model of Internet of Things Assigned Based on Composite Security Key
    Sun, Ying
    Bai, Lei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [36] Security in the internet of things
    Aigner M.
    [J]. Cryptology and Information Security Series, 2010, 4 : 109 - 124
  • [37] Internet of things security
    Dazine, Jihad
    Maizate, Abderrahim
    Hassouni, Larbi
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 137 - 141
  • [38] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [39] Internet of things security
    Baskaran S.B.M.
    [J]. Journal of ICT Standardization, 2019, 7 (01): : 21 - 39
  • [40] Blockchain-Based Access Control Model for Security Attributes in the Internet of Things
    Yan, Xincheng
    Wu, Jianhua
    Zhou, Na
    Jiang, Zhihong
    Wu, Juqin
    Yin, Jianhui
    Liu, Ying
    [J]. 2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 95 - 101