Essay sample

Exploiting Contextual Trust and Risk Assessment for Adaptive Security in Iot (Internet of Things)

Free ideas for

Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, etc

In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, including the lack of publicly available IoT datasets that can be used by the research and practitioner communities.

Free ideas for

In smart M-IoT, security refers to the protection of the infrastructure from potentially hazardous components and users, which may exploit the network with vulnerabilities, based on the known/unknown cyber attacks

For privacy, it deals with the preservation of lawfulness in sharing the information aboutand-between the involved devices. Since smart M-IoT will be dealing with a lot of connected components, maintenance of isolation in traffic patterns and establishing anonymity of users becomes an utmost requirement. Trust refers to the faithfulness in the identification of devices for communication. It further involves the reputation-building between the devices and the infrastructure leading a way to make the network secure while preserving its privacy.The effective implementation of rules and policies at the control layer due to the configuration complexity and artifacts requires intelligent solutions that can be assured by using certain aspects of optimization, machine learning or artificial intelligence.

Free ideas for

In computing, a scenario is a narrative: it most commonly describes foreseeable interactions of user roles and the technical system, which usually includes computer hardware and software. A scenario has a goal, a time-frame, and scope. Alexander and Maidendescribe several types of scenarios, such as stories, situations (alternative worlds), simulations, story boards, sequences, and structures. Scenarios have interaction points and decision points where the technology under consideration can interact with the scenario. This means that the scenarios developed for a particular situation have to take into consideration the technologies used by the different actors. The importance of scenarios in the assessment of security solutions has been discussed in the literature. This work focuses on the development of scenarios that support the evaluation of adaptive security techniques for the IoT in eHealth. There are many definitions of the IoT. For instance, the ITU-Tdefines the IoT as “a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”.

Free ideas for

Thus, for the future advancement of the IoT, it is therefore imperative to develop a multifaceted technology approach to IoT security, interoperability, management and privacy. The internetworking mechanisms of things, WSNs and traditional computer devices in the IoT are vital with respect to standardizing the communications on the Internet. It is also crucial to have lightweight, scalable and adaptive security solutions in place to secure the users’ information and preserve their privacy in the IoT.

Free ideas for

I. F. Alexander and N. Maiden, Eds., “Scenarios, Stories, Use Cases: Through the Systems Development LifeCycle”. John Wiley & Sons, 2004.

S. Faily and I. Flechais, “A meta-model for usable secure requirements engineering,” in SESS – ICSE Workshop on Software Engineering for Secure Systems. Association for Computing Machinery (ACM), 2010.

H. Mouratidis and P. Giorgini, “Security attack testing (SAT)–testing the security of information systems at design time,” Information Systems, vol. 32, no. 1, Jan. 2007, pp. 1166–1183.

O. Vermesan, P. Friess, P. Guillemin, H. Sundmaeker, M. Eisenhauer, K. Moessner, F. L. Gall, and P. Cousin, “Internet of things strategic research and innovation agenda,” in Internet of Things–Global Technological and Societal Trends. River Publishers, 2011, pp. 7–151.

K. Habib and W. Leister, “Adaptive security for the Internet of Things reference model,” in Proceeding of Norwegian Information Security Conference, NISK 2013, C. Rong and V. Oleshchuk, Eds., 2013, pp. 13–24.

Was this essay example useful for you?

Do you need extra help?

Order unique essay written for you
ORDER NOW
456
Words
5
References
essay statistic graph
Topic Popularity
ORDER ESSAY