DocumentCode :
3577191
Title :
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture
Author :
Gyrard, Amelie ; Bonnet, Christian ; Boudaoud, Karima
Author_Institution :
Mobile Commun., Eurecom, Biot, France
fYear :
2014
Firstpage :
109
Lastpage :
116
Abstract :
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various domains (Web, MANET, 2G/GSM, 3G/UMTS, 4G/LTE, Wi-Fi, Intrusion Detection System). Since, most of the existing security ontologies are not published online or do not follow semantic web best practices, we have designed the STAC (Security Toolbox: Attack & Countermeasure) ontology-based security knowledge respecting the semantic web guidelines. The STAC ontology, dataset and application have been designed to help software developers or designers to choose security mechanisms fitting their needs to secure Internet of Things (IoT) applications. STAC is published online (http://sensormeasurement.appspot.com/?p=stac).
Keywords :
3G mobile communication; 4G mobile communication; Internet of Things; computer network security; ontologies (artificial intelligence); semantic Web; wireless LAN; 2G/GSM; 3G/UMTS; 4G/LTE; ETSI machine-to-machine architecture security; Internet of Things; MANET; STAC; Wi-Fi; cellular communications; database; devices; heterogeneous wireless communications; intrusion detection system; mobile phone; ontology-based approach; programming language; security ontologies; security toolbox attack and countermeasure ontology-based security knowledge; semantic Web best practices; semantic Web guidelines; sensor; software developers; wired communications; Cryptography; IEEE 802.11 Standards; Ontologies; Protocols; Semantic Web; Wireless communication; 2G/GSM; 3G/UMTS; 4G/LTE; Cryptography; ETSI Machine to Machine (M2M); Internet of Things; OWL; Security Mechanism; Security Property; Security Protocol; Security ontologies; Semantic Web; Semantic Web of Things; Sensor Networks; WLAN; Wi-Fi;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Communications (GreenCom), IEEE and Cyber, Physical and Social Computing(CPSCom), IEEE
Print_ISBN :
978-1-4799-5967-9
Type :
conf
DOI :
10.1109/iThings.2014.25
Filename :
7059650
Link To Document :
بازگشت