Nowadays, the Internet of Things (IoT) is a consolidated reality. Smart homes are equipped with a growing number of IoT devices that capture more and more information about human beings lives. However, manufacturers paid little or no attention to security, so that various challenges are still in place. In this paper, we propose a novel approach to secure IoT systems that combines the concept of Security-by-Contract (S×C) with the Fog computing distributed paradigm. We define the pillars of our approach, namely the notions of IoT device contract, Fog node policy and contract-policy matching, the respective life-cycles, and the resulting S×C workflow. To better understand all the concepts of the S×C framework, and highlight its practical feasibility, we use a running case study based on a context-Aware system deployed in a real smart home.
Protecting the Internet of Things with Security-by-Contract and Fog Computing / Giaretta, A.; Dragoni, N.; Massacci, F.. - ELETTRONICO. - (2019), pp. 1-6. (Intervento presentato al convegno 5th IEEE World Forum on Internet of Things, WF-IoT 2019 tenutosi a Limerick, Ireland nel 15-18 April 2019) [10.1109/WF-IoT.2019.8767243].
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Massacci F.
2019-01-01
Abstract
Nowadays, the Internet of Things (IoT) is a consolidated reality. Smart homes are equipped with a growing number of IoT devices that capture more and more information about human beings lives. However, manufacturers paid little or no attention to security, so that various challenges are still in place. In this paper, we propose a novel approach to secure IoT systems that combines the concept of Security-by-Contract (S×C) with the Fog computing distributed paradigm. We define the pillars of our approach, namely the notions of IoT device contract, Fog node policy and contract-policy matching, the respective life-cycles, and the resulting S×C workflow. To better understand all the concepts of the S×C framework, and highlight its practical feasibility, we use a running case study based on a context-Aware system deployed in a real smart home.File | Dimensione | Formato | |
---|---|---|---|
Protecting_the_Internet_of_Things_with_Security-by-Contract_and_Fog_Computing.pdf
Solo gestori archivio
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
274.38 kB
Formato
Adobe PDF
|
274.38 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione