2015
DOI: 10.1016/j.cose.2015.06.002
|View full text |Cite
|
Sign up to set email alerts
|

SecKit: A Model-based Security Toolkit for the Internet of Things

Abstract: The control and protection of user data is a very important aspect in the design and deployment of the Internet of Things (IoT). The heterogeneity of IoT technologies, the large number of devices and systems, and the different types of users and roles create important challenges in this context. In particular, requirements of scalability, interoperability, trust and privacy are difficult to address even with the considerable amount of existing work both in the research and standardization community. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 109 publications
(66 citation statements)
references
References 28 publications
0
65
0
Order By: Relevance
“…Therefore, satisfying security requirements such as data authenticity, data confidentiality and access control are essentials in IoT-based systems (Sicari et al 2015). In this regard, various models or schemes have been introduced to ensure security in the IoTbased systems; e.g., Vucinic et al (2015) propose a model (OSCAR) for end-to-end security in the IoT systems, Moosavi et al (2016) also present an end-to-end security scheme for mobility enabled healthcare IoT systems and Neisse et al (2015) offer a model to provide security for data protection in IoT systems.…”
Section: Iot-based System Architecturementioning
confidence: 99%
“…Therefore, satisfying security requirements such as data authenticity, data confidentiality and access control are essentials in IoT-based systems (Sicari et al 2015). In this regard, various models or schemes have been introduced to ensure security in the IoTbased systems; e.g., Vucinic et al (2015) propose a model (OSCAR) for end-to-end security in the IoT systems, Moosavi et al (2016) also present an end-to-end security scheme for mobility enabled healthcare IoT systems and Neisse et al (2015) offer a model to provide security for data protection in IoT systems.…”
Section: Iot-based System Architecturementioning
confidence: 99%
“…In order to rapid customize and develop an Internet of Things' System according to the require of management, we propose a new method to manage Internet of Things based on WiFi and runtime model [7]. Specifically provides as follow, we give an example in an actual scenario of company management using our method, and during this example we can verify the feasible and validity of our method.…”
Section: Introductionmentioning
confidence: 99%
“…Policies are evaluated using a discrete time step window with a con gurable time granularity that is con gured according to the policy requirements, for example, if the policy refers to restrictions on data usage considering hours, days, months, etc. For details about all operators supported in our policy language we refer the reader to [9].…”
Section: Usage Control Policy Languagementioning
confidence: 99%
“…In our approach we specify these restrictions using the security policy language proposed by the Model-based Security Toolkit (SecKit) [9], already applied also to Internet of Things [8] and mobile devices [10] domains. In the SecKit policy language detective and preventive mechanisms are speci ed using ECA (Event-Condition-Action) rules.…”
Section: Usage Control Policy Languagementioning
confidence: 99%
See 1 more Smart Citation