Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Avatar Conception for “Thing” Representation in Internet of Things
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik. (Cyber Security)
2018 (engelsk)Inngår i: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018, 2018, s. 46-49Konferansepaper, Poster (with or without abstract) (Fagfellevurdert)
Abstract [en]

The complexity of ensuring IoT security is that the system is heterogeneous, consists of many assets on each of the architecture layer. Many experts in IoT security focus on threat analysis  and risk assessments to estimate the impact if a security incident or a breach occurs.

In order to provide the general security requirements for the IoT system using threat risk modelling, the first thing to do is to identify the main security stakeholders, security assets, possible attacks, and, finally, threats for the IoT system. Using this general IoT threat model as a basis you can create a specific set of security objectives for a specific IoT application domain.

In this paper we will try to highlight the assets that necessary for further analysis of the treat model for Internet of Things. We will also specify the stakeholders who are the connecting link between IoT devices, services and customers, as well as link between transfer and displaying the client commands onto smart things.

For describing the model of component interaction in IoT system we will use the avatar-oriented approach since it allows us to merge objects into a system of objects. IoT Service has a more complex structure than a single entity. The application can use several services to display all information to end user, can aggregate data from several devices.

To manipulate data objects the avatar representation approach is most appropriate, then you can easily connect or disconnect microservices, data from things, visual representation of data.

sted, utgiver, år, opplag, sider
2018. s. 46-49
Emneord [en]
IoT, Avatar, Thing instance Threat assessment Security risk assessment.
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-17130OAI: oai:DiVA.org:bth-17130DiVA, id: diva2:1255838
Konferanse
14th Swedish National Computer Networking Workshop (SNCNW 2018), Karlskrona
Tilgjengelig fra: 2018-10-15 Laget: 2018-10-15 Sist oppdatert: 2018-10-17bibliografisk kontrollert

Open Access i DiVA

Avatar conception(336 kB)17 nedlastinger
Filinformasjon
Fil ATTACHMENT01.pdfFilstørrelse 336 kBChecksum SHA-512
237d98b769f980ca27f89a599febea04c2fe80249a8c1dd61983fe3e2570b67ac5085acbab3d4b77d06b2b590723f9294952ed8c44b33880cf084c7bd99e7841
Type attachmentMimetype application/pdf

Personposter BETA

Kuzminykh, Ievgeniia

Søk i DiVA

Av forfatter/redaktør
Kuzminykh, Ievgeniia
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 50 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf