Security policy enforcement for networked smart objects

被引:29
|
作者
Sicari, Sabrina [1 ]
Rizzardi, Alessandra [1 ]
Miorandi, Daniele [2 ]
Cappiello, Cinzia [3 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Appl, Via Mazzini 5, I-21100 Varese, Italy
[2] U Hopper Srl, Via A Trento 8-2, I-38122 Trento, Italy
[3] Politecn Milan, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy
关键词
Internet of things; Security; Data quality; Policy enforcement; Middleware; Prototype; INTERNET; THINGS; ARCHITECTURE; CHALLENGES; PRIVACY;
D O I
10.1016/j.comnet.2016.08.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (IoT) heterogeneous technologies concur to the provisioning of customized services able to bridge the gap between the physical and digital realms. Security, privacy and data quality are acknowledged to represent key issues to be tackled in order to foster the large-scale adoption of IoT systems and technologies. One instrumental aspect concerns the ability of the system to preserve security in the presence of external attacks. In such a scenario, the integration of a flexible IoT middleware, able to handle a large number of data streams and of interconnected devices, with a flexible policy enforcement framework is needed and presented in this paper. The proposed solution aims to ease the management of interactions across different realms and policy conflicts. Its effectiveness is validated by means of a lightweight and cross-domain prototypical implementation. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:133 / 147
页数:15
相关论文
共 50 条
  • [1] Security towards the edge: Sticky, policy enforcement for networked smart objects
    Sicari, Sabrina
    Rizzardi, Alessandra
    Miorandi, Daniele
    Coen-Porisini, Alberto
    [J]. INFORMATION SYSTEMS, 2017, 71 : 78 - 89
  • [2] SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
    Thomasset, Corentin
    Barrera, David
    [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 542 - 555
  • [3] A flexible architecture for security policy enforcement
    McDaniel, P
    Prakash, A
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
  • [4] Patterns in security enforcement policy development
    Thomsen, Dan
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 744 - 748
  • [5] Walls of security and policy enforcement in Belfast
    Ballif, Florine
    [J]. MEMOIRES IDENTITES MARGINALITES DANS LE MONDE OCCIDENTAL CONTEMPORAIN, 2009, 5
  • [6] Dynamic Security Policy Enforcement on Android
    Vanco, Matus
    Aron, Lukas
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 141 - 148
  • [7] An Android Security Policy Enforcement Tool
    Cotterell, Kathryn
    Welch, Ian
    Chen, Aaron
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2015, 61 (04) : 311 - 320
  • [8] Transparent network security policy enforcement
    Keromytis, AD
    Wright, JL
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2000, : 215 - 225
  • [9] Policy Enforcement for Big Data security
    Al-Shomrani, Abdullah
    Fathy, Fathy
    Jambi, Kamal
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 70 - 74
  • [10] Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors
    Khoury, Raphael
    Tawbi, Nadia
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)