Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Avatar Conception for “Thing” Representation in Internet of Things
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik. (Cyber Security)
2018 (Engelska)Ingår i: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018, 2018, s. 46-49Konferensbidrag, Poster (med eller utan abstract) (Refereegranskat)
Abstract [en]

The complexity of ensuring IoT security is that the system is heterogeneous, consists of many assets on each of the architecture layer. Many experts in IoT security focus on threat analysis  and risk assessments to estimate the impact if a security incident or a breach occurs.

In order to provide the general security requirements for the IoT system using threat risk modelling, the first thing to do is to identify the main security stakeholders, security assets, possible attacks, and, finally, threats for the IoT system. Using this general IoT threat model as a basis you can create a specific set of security objectives for a specific IoT application domain.

In this paper we will try to highlight the assets that necessary for further analysis of the treat model for Internet of Things. We will also specify the stakeholders who are the connecting link between IoT devices, services and customers, as well as link between transfer and displaying the client commands onto smart things.

For describing the model of component interaction in IoT system we will use the avatar-oriented approach since it allows us to merge objects into a system of objects. IoT Service has a more complex structure than a single entity. The application can use several services to display all information to end user, can aggregate data from several devices.

To manipulate data objects the avatar representation approach is most appropriate, then you can easily connect or disconnect microservices, data from things, visual representation of data.

Ort, förlag, år, upplaga, sidor
2018. s. 46-49
Nyckelord [en]
IoT, Avatar, Thing instance Threat assessment Security risk assessment.
Nationell ämneskategori
Telekommunikation
Identifikatorer
URN: urn:nbn:se:bth-17130OAI: oai:DiVA.org:bth-17130DiVA, id: diva2:1255838
Konferens
14th Swedish National Computer Networking Workshop (SNCNW 2018), Karlskrona
Tillgänglig från: 2018-10-15 Skapad: 2018-10-15 Senast uppdaterad: 2018-10-17Bibliografiskt granskad

Open Access i DiVA

Avatar conception(336 kB)16 nedladdningar
Filinformation
Filnamn ATTACHMENT01.pdfFilstorlek 336 kBChecksumma SHA-512
237d98b769f980ca27f89a599febea04c2fe80249a8c1dd61983fe3e2570b67ac5085acbab3d4b77d06b2b590723f9294952ed8c44b33880cf084c7bd99e7841
Typ attachmentMimetyp application/pdf

Personposter BETA

Kuzminykh, Ievgeniia

Sök vidare i DiVA

Av författaren/redaktören
Kuzminykh, Ievgeniia
Av organisationen
Institutionen för datalogi och datorsystemteknik
Telekommunikation

Sök vidare utanför DiVA

GoogleGoogle Scholar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 50 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf