Architectural Patterns for Secure IoT Orchestrations

被引:0
|
作者
Fysarakis, Konstantinos [1 ]
Spanoudakis, George [1 ]
Petroulakis, Nikolaos [2 ]
Soultatos, Othonas [2 ]
Broering, Arne [3 ]
Marktscheffel, Tobias [4 ]
机构
[1] Sphynx Technol Solut AG, Zug, Switzerland
[2] Fdn Res & Technol Hellas, Inst Comp Sci, Iraklion, Greece
[3] Siemens AG, Corp Technol, Munich, Germany
[4] Univ Passau, Passau, Germany
关键词
security modeling; pattern-based engineering; internet of things; INTERNET; THINGS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and "things". In this context, the SEMIoTICS project aims to develop a pattern-driven framework, built upon existing IoT platforms, to enable and guarantee secure and dependable actuation and semi-autonomic behaviour in IoT/Industrial IoT applications. To achieve this, patterns are used to encode proven dependencies between the security, privacy, dependability and interoperability (SPDI) properties of individual smart objects and corresponding properties of orchestrations (composition) involving them. This paper sketches this approach followed by SEMIoTICS, whereby the SPDI patterns are used to generate IoT orchestrations with proven SPDI properties at design time, while at runtime these properties are monitored in real-time, across system layers, triggering adaptations to return the deployed orchestration to the desired SPDI state, when needed.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] CIRCE: Architectural Patterns for Circular and Trustworthy By-Design IoT Orchestrations
    Papoutsakis, Manos
    Fysarakis, Konstantinos
    Michalodimitrakis, Emmanouil
    Spanoudakis, George
    Ioannidis, Sotiris
    [J]. FRONTIERS IN SUSTAINABILITY, 2022, 3
  • [2] Secure Software Architectural Patterns Designed with Secure Connectors
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 484 - 491
  • [3] An Architectural Approach to End User Orchestrations
    Dwivedi, Vishal
    Velasco-Elizondo, Perla
    Fernandes, Jose Maria
    Garlan, David
    Schmerl, Bradley
    [J]. SOFTWARE ARCHITECTURE, 2011, 6903 : 370 - +
  • [4] Highly Secure and Efficient Architectural Model for IoT Based Health Care Systems
    Binu, P. K.
    Thomas, Karun
    Varghese, Nithin P.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 487 - 493
  • [5] Enabling Design of Secure IoT Systems with Trade-Off-Aware Architectural Tactics
    Orellana, Cristian
    Cereceda-Balic, Francisco
    Solar, Mauricio
    Astudillo, Hernán
    [J]. Sensors, 2024, 24 (22)
  • [6] Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis
    Manos, Papoutsakis
    Konstantinos, Fysarakis
    George, Spanoudakis
    Sotiris, Ioannidis
    [J]. IEEE Internet of Things Magazine, 2021, 4 (02): : 80 - 87
  • [7] Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees
    Fysarakis, Konstantinos
    Papoutsakis, Manos
    Petroulakis, Nikolaos
    Spanoudakis, George
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [8] Declarative Secure Placement of FaaS Orchestrations in the Cloud-Edge Continuum
    Bocci, Alessandro
    Forti, Stefano
    Ferrari, Gian-Luigi
    Brogi, Antonio
    [J]. ELECTRONICS, 2023, 12 (06)
  • [9] The design of secure IoT applications using patterns: State of the art and directions for research
    Fernandez, Eduardo B.
    Washizaki, Hironori
    Yoshioka, Nobukazu
    Okubo, Takao
    [J]. INTERNET OF THINGS, 2021, 15
  • [10] CERTIFIABLY SECURE IoT
    Pesce, Mark
    [J]. IEEE SPECTRUM, 2020, 57 (10) : 19 - 19