oru.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
IoT Security Configurability with Security-by-Contract
Örebro universitet, Institutionen för naturvetenskap och teknik. (Centre for Applied Autonomous Sensors Systems (AASS))ORCID-id: 0000-0001-9293-7711
Örebro universitet, Institutionen för naturvetenskap och teknik. DTU Compute, Technical University of Denmark, Lyngby, Denmark. (Centre for Applied Autonomous Sensors Systems (AASS))ORCID-id: 0000-0001-9575-2990
Department of Information Science and Engineering, University of Trento, Trento, Italy.
2019 (Engelska)Ingår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 19, nr 19, artikel-id E4121Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.

Ort, förlag, år, upplaga, sidor
MDPI, 2019. Vol. 19, nr 19, artikel-id E4121
Nyckelord [en]
Fog computing, IoT, configurability, security, security-by-contract
Nationell ämneskategori
Datorsystem
Identifikatorer
URN: urn:nbn:se:oru:diva-76829DOI: 10.3390/s19194121ISI: 000494823200065PubMedID: 31548501Scopus ID: 2-s2.0-85072578077OAI: oai:DiVA.org:oru-76829DiVA, id: diva2:1355594
Tillgänglig från: 2019-09-30 Skapad: 2019-09-30 Senast uppdaterad: 2019-11-22Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextPubMedScopus

Personposter BETA

Giaretta, AlbertoDragoni, Nicola

Sök vidare i DiVA

Av författaren/redaktören
Giaretta, AlbertoDragoni, Nicola
Av organisationen
Institutionen för naturvetenskap och teknik
I samma tidskrift
Sensors
Datorsystem

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
pubmed
urn-nbn

Altmetricpoäng

doi
pubmed
urn-nbn
Totalt: 70 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf