oru.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
IoT Security Configurability with Security-by-Contract
Örebro University, School of Science and Technology. (Centre for Applied Autonomous Sensors Systems (AASS))ORCID iD: 0000-0001-9293-7711
Örebro University, School of Science and Technology. DTU Compute, Technical University of Denmark, Lyngby, Denmark. (Centre for Applied Autonomous Sensors Systems (AASS))ORCID iD: 0000-0001-9575-2990
Department of Information Science and Engineering, University of Trento, Trento, Italy.
2019 (English)In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 19, no 19, article id E4121Article in journal (Refereed) Published
Abstract [en]

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.

Place, publisher, year, edition, pages
MDPI, 2019. Vol. 19, no 19, article id E4121
Keywords [en]
Fog computing, IoT, configurability, security, security-by-contract
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:oru:diva-76829DOI: 10.3390/s19194121PubMedID: 31548501Scopus ID: 2-s2.0-85072578077OAI: oai:DiVA.org:oru-76829DiVA, id: diva2:1355594
Available from: 2019-09-30 Created: 2019-09-30 Last updated: 2019-09-30Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textPubMedScopus

Authority records BETA

Giaretta, AlbertoDragoni, Nicola

Search in DiVA

By author/editor
Giaretta, AlbertoDragoni, Nicola
By organisation
School of Science and Technology
In the same journal
Sensors
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
pubmed
urn-nbn

Altmetric score

doi
pubmed
urn-nbn
Total: 17 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf