期刊论文详细信息
Future Internet
EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things
Waqas Aman1  Einar Snekkenes2 
[1] Norwegian Information Security Laboratory (NISLab), Gjøvik University College, 2815 Gjøvik, Norway; E-Mail
关键词: Internet of Things;    adaptive security;    eHealth;    event-driven architecture;    risk management;    event correlation;   
DOI  :  10.3390/fi7030225
来源: mdpi
PDF
【 摘 要 】

In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS) model for IoT. EDAS aims to observe security events (changes) generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190009652ZK.pdf 3704KB PDF download
  文献评价指标  
  下载次数:2次 浏览次数:4次