TY - GEN
T1 - Managing security trade-offs in the Internet of Things using adaptive security
AU - Aman, Waqas
AU - Snekkenes, Einar
N1 - Publisher Copyright:
© 2015 Infonomics Society.
PY - 2015
Y1 - 2015
N2 - Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.
AB - Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.
KW - Adaptive Security
KW - Event Driven Architecture
KW - Internet of Things
KW - eHealth
UR - http://www.scopus.com/inward/record.url?scp=84964425095&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964425095&partnerID=8YFLogxK
U2 - 10.1109/ICITST.2015.7412122
DO - 10.1109/ICITST.2015.7412122
M3 - Conference contribution
T3 - 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015
SP - 362
EP - 368
BT - 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015
PB - IEEE
T2 - 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015
Y2 - 14 December 2015 through 16 December 2015
ER -