2015
DOI: 10.3390/fi7030225
|View full text |Cite
|
Sign up to set email alerts
|

EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

Abstract: In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
5
0
2
Order By: Relevance
“…In order to evaluate the advantages of the proposed architecture, based on the previously-mentioned methods, a simplified approach of the architecture tradeoff analysis method (ATAM) has been selected to perform a comparative analysis [ 40 , 48 , 49 ]. This method is widely used by the research community for architecture evaluation [ 50 , 51 , 52 ]. When the architecture is evaluated, depending on the requirements, different qualities must be analyzed.…”
Section: Resultsmentioning
confidence: 99%
“…In order to evaluate the advantages of the proposed architecture, based on the previously-mentioned methods, a simplified approach of the architecture tradeoff analysis method (ATAM) has been selected to perform a comparative analysis [ 40 , 48 , 49 ]. This method is widely used by the research community for architecture evaluation [ 50 , 51 , 52 ]. When the architecture is evaluated, depending on the requirements, different qualities must be analyzed.…”
Section: Resultsmentioning
confidence: 99%
“…The Risk Adapter utilizes a runtime adaptation ontology and responds to an alarm by selecting an optimal response as per the contextual requirements. The model is extended to a technical specification of a system architecture, and its feasibility is investigated as a real-world artifact in [5]. A description of its major components is given in Table I.…”
Section: A the Edas Modelmentioning
confidence: 99%
“…The Risk Adapter components, as shown in Fig. 7 (excluding the Object and Alarm), are the necessary vocabulary in the adaptation ontology proposed in [5]. It is accessed as per the scenario to formulate the adaptation (trade-off) decision which is sent to the Event Source as an adaptation request (AdaptRequest).…”
Section: Scenario Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…Os SAAs de IoT que consideram o contexto (ambiente) como fator de adaptação simplesmente alteram o mecanismo de autenticação à medida que o dispositivo se move entre ambientes [Aman and Snekkenes 2015]. E há aqueles que exploram a percepção sobre o risco como fator de adaptação, ao detectar mudanças do risco derivado da localização, do tráfego de rede e de mensagens trocadas pelo dispositivo [Sylla et al 2020].…”
Section: Introductionunclassified