Managing security trade-offs in the Internet of Things using adaptive security

Waqas Aman, Einar Snekkenes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.

Original languageUndefined/Unknown
Title of host publication10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015
PublisherIEEE
Pages362-368
Number of pages7
ISBN (Electronic)9781908320520
DOIs
Publication statusPublished - 2015
Event10th International Conference for Internet Technology and Secured Transactions, ICITST 2015 - London, United Kingdom
Duration: Dec 14 2015Dec 16 2015

Publication series

Name2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015

Conference

Conference10th International Conference for Internet Technology and Secured Transactions, ICITST 2015
Country/TerritoryUnited Kingdom
CityLondon
Period12/14/1512/16/15

Keywords

  • Adaptive Security
  • Event Driven Architecture
  • Internet of Things
  • eHealth

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this