Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Avatar Conception for “Thing” Representation in Internet of Things
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering. (Cyber Security)
2018 (English)In: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018, 2018, p. 46-49Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

The complexity of ensuring IoT security is that the system is heterogeneous, consists of many assets on each of the architecture layer. Many experts in IoT security focus on threat analysis  and risk assessments to estimate the impact if a security incident or a breach occurs.

In order to provide the general security requirements for the IoT system using threat risk modelling, the first thing to do is to identify the main security stakeholders, security assets, possible attacks, and, finally, threats for the IoT system. Using this general IoT threat model as a basis you can create a specific set of security objectives for a specific IoT application domain.

In this paper we will try to highlight the assets that necessary for further analysis of the treat model for Internet of Things. We will also specify the stakeholders who are the connecting link between IoT devices, services and customers, as well as link between transfer and displaying the client commands onto smart things.

For describing the model of component interaction in IoT system we will use the avatar-oriented approach since it allows us to merge objects into a system of objects. IoT Service has a more complex structure than a single entity. The application can use several services to display all information to end user, can aggregate data from several devices.

To manipulate data objects the avatar representation approach is most appropriate, then you can easily connect or disconnect microservices, data from things, visual representation of data.

Place, publisher, year, edition, pages
2018. p. 46-49
Keywords [en]
IoT, Avatar, Thing instance Threat assessment Security risk assessment.
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-17130OAI: oai:DiVA.org:bth-17130DiVA, id: diva2:1255838
Conference
14th Swedish National Computer Networking Workshop (SNCNW 2018), Karlskrona
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2018-10-17Bibliographically approved

Open Access in DiVA

Avatar conception(336 kB)16 downloads
File information
File name ATTACHMENT01.pdfFile size 336 kBChecksum SHA-512
237d98b769f980ca27f89a599febea04c2fe80249a8c1dd61983fe3e2570b67ac5085acbab3d4b77d06b2b590723f9294952ed8c44b33880cf084c7bd99e7841
Type attachmentMimetype application/pdf

Authority records BETA

Kuzminykh, Ievgeniia

Search in DiVA

By author/editor
Kuzminykh, Ievgeniia
By organisation
Department of Computer Science and Engineering
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 50 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf