An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture

Résumé

Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various domains (Web, MANET, 2G/GSM, 3G/UMTS, 4G/LTE, Wi-Fi, Intrusion Detection System). Since, most of the existing security ontologies are not published online or do not follow semantic web best practices, we have designed the STAC (Security Toolbox: Attack & Countermeasure) ontology-based security knowledge respecting the semantic web guidelines. The STAC ontology, dataset and application have been designed to help software developers or designers to choose security mechanisms fitting their needs to secure Internet of Things (IoT) applications. STAC is published online (http://sensormeasurement.appspot.com/?p=stac).
Fichier principal
Vignette du fichier
iThings2014_STAC_gyrard.pdf (517.36 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01017945 , version 1 (03-07-2014)

Identifiants

  • HAL Id : hal-01017945 , version 1

Citer

Amelie Gyrard, Christian Bonnet, Karima Boudaoud. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture. IEEE International Conference on Internet of Things 2014 (iThings), Sep 2014, Taipei, Taiwan. ⟨hal-01017945⟩
241 Consultations
833 Téléchargements

Partager

Gmail Facebook X LinkedIn More