An ontology-based approach for helping to secure the ETSI machine-to-machine architecture

Gyrard, Amélie; Bonnet, Christian; Boudaoud, Karima
ITHINGS 2014, IEEE International Conference on Internet of Things 2014, September 1-3, 2014, Taipei, Taiwan

Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various domains (Web, MANET, 2G/GSM, 3G/UMTS, 4G/LTE, Wi-Fi, Intrusion Detection System). Since, most of the existing security ontologies are not published online or do not follow semantic web best practices, we have designed the STAC (Security Toolbox: Attack & Countermeasure) ontology-based security knowledge respecting the semantic web guidelines. The STAC ontology, dataset and application have been designed to help software developers or designers to choose security mechanisms fitting their needs to secure Internet of Things (IoT) applications. STAC is published online (http://sensormeasurement.appspot.com/?p=stac).

DOI
HAL
Type:
Conférence
City:
Taipei
Date:
2014-09-01
Department:
Systèmes de Communication
Eurecom Ref:
4322
Copyright:
© 2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PERMALINK : https://www.eurecom.fr/publication/4322