EconPapers    
Economics at your fingertips  
 

EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

Waqas Aman and Einar Snekkenes
Additional contact information
Waqas Aman: Norwegian Information Security Laboratory (NISLab), Gjøvik University College, 2815 Gjøvik, Norway
Einar Snekkenes: Norwegian Information Security Laboratory (NISLab), Gjøvik University College, 2815 Gjøvik, Norway

Future Internet, 2015, vol. 7, issue 3, 1-32

Abstract: In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS) model for IoT. EDAS aims to observe security events (changes) generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

Keywords: Internet of Things; adaptive security; eHealth; event-driven architecture; risk management; event correlation (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2015
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/7/3/225/pdf (application/pdf)
https://www.mdpi.com/1999-5903/7/3/225/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:7:y:2015:i:3:p:225-256:d:52288

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:7:y:2015:i:3:p:225-256:d:52288