Ecole d'ingénieur et centre de recherche en Sciences du numérique

An ontology-based approach for helping to secure the ETSI machine-to-machine architecture

Gyrard, Amélie; Bonnet, Christian; Boudaoud, Karima

ITHINGS 2014, IEEE International Conference on Internet of Things 2014, September 1-3, 2014, Taipei, Taiwan

Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various domains (Web, MANET, 2G/GSM, 3G/UMTS, 4G/LTE, Wi-Fi, Intrusion Detection System). Since, most of the existing security ontologies are not published online or do not follow semantic web best practices, we have designed the STAC (Security Toolbox: Attack & Countermeasure) ontology-based security knowledge respecting the semantic web guidelines. The STAC ontology, dataset and application have been designed to help software developers or designers to choose security mechanisms fitting their needs to secure Internet of Things (IoT) applications. STAC is published online (

Document Doi Hal Bibtex

Titre:An ontology-based approach for helping to secure the ETSI machine-to-machine architecture
Mots Clés:Security ontologies; Semantic Web; OWL; Internet of Things; ETSI Machine to Machine (M2M); Semantic Web of Things; 2G/GSM; 3G/UMTS; 4G/LTE; Wi-Fi; WLAN; Security Property; Cryptography; Security Protocol; Security Mechanism; Sensor Networks
Département:Systèmes de Communication
Eurecom ref:4322
Copyright: © 2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Bibtex: @inproceedings{EURECOM+4322, doi = {}, year = {2014}, title = {{A}n ontology-based approach for helping to secure the {ETSI} machine-to-machine architecture}, author = {{G}yrard, {A}m{\'e}lie and {B}onnet, {C}hristian and {B}oudaoud, {K}arima}, booktitle = {{ITHINGS} 2014, {IEEE} {I}nternational {C}onference on {I}nternet of {T}hings 2014, {S}eptember 1-3, 2014, {T}aipei, {T}aiwan}, address = {{T}aipei, {TA}{\"{I}}{WAN}, {PROVINCE} {DE} {CHINE}}, month = {09}, url = {} }
Voir aussi: