Inicio  /  Future Internet  /  Vol: 7 Par: 3 (2015)  /  Artículo
ARTÍCULO
TITULO

EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

Waqas Aman and Einar Snekkenes    

Resumen

In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS) model for IoT. EDAS aims to observe security events (changes) generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype?s major components and have highlighted the key technical challenges.

 Artículos similares

       
 
Juan Wang, Jing Zhong and Jiangqi Li    
With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary. However, existing works require a lot of manual effort and f... ver más
Revista: Future Internet

 
Chi-Thien Nguyen, Thanh-Truong Nguyen, Trung-Hau Nguyen, Ba-Tung Le, Tran-De-Nhat Truong, Duc-Duy Ho and Thanh-Canh Huynh    
This study examined the feasibility of the admittance-based method for detecting simulated damage in the bearing plate of a prestressed anchorage. The proposed method utilized the PZT (lead zirconate titanate) interface technique to acquire a strong admi... ver más
Revista: Buildings

 
Thoralf Reis, Tim Funke, Sebastian Bruchhaus, Florian Freund, Marco X. Bornschlegl and Matthias L. Hemmje    
Climate change means coping directly or indirectly with extreme weather conditions for everybody. Therefore, analyzing meteorological data to create precise models is gaining more importance and might become inevitable. Meteorologists have extensive doma... ver más

 
Massimiliano Lo Turco, Elisabetta Caterina Giovannini and Andrea Tomalini    
In recent years we have been experiencing an ever-increasing number of Building Modeling Modeling (BIM) and Visual Programming Language (VPL) approaches in the architectural design field. These experiments have inspired new research strictly focused on e... ver más

 
Oscar Romero, Aika Silveira Miura, Lorena Parra and Jaime Lloret    
Mobility in urban and interurban areas, mainly by cars, is a day-to-day activity of many people. However, some of its main drawbacks are traffic jams and accidents. Newly made vehicles have pre-installed driving evaluation systems, which can prevent acci... ver más