Authors: Mozzaquatro, B.A., Melo, R., Agostinho, C., Jardim-Goncalves, R.
Abstract: Embedded devices based on emerging technologies of the Internet of Things (IoT) are used to provide resources, business models and opportunities to build potential industrial systems improving manufacturing systems with efficient operations. In this context, IoT networks are dynamic environments and changes are also being increasingly frequent, modifying the environment execution. Nevertheless, severe threats will increase the complexity and difficulty to protect existing vulnerabilities in smart devices of IoT network. In this context, this work proposes an architecture of the ontology-based security framework to decision-making using adaptive security model to improve secure information for the industrial systems. IoTSec ontology contributes to feed the system using queries of contextual information collected in the environment. The main contribution of this approach is validated as an integration with C2NET project to ensure security properties in some critical scenarios.
Authors: Mozzaquatro, B. A., Jardim-Goncalves, R., & Agostinho, C.
Abstract: The diversity of wireless technologies, connected to the Internet and the more powerful and smaller embedded devices, allows to encompass services to improve everyday activities around us through new applications and businesses. This context emerged with the Internet of Things (IoT), where different technologies connected with the Internet provide several applications to change people's lifestyle. However, such integration of heterogeneous devices causes many problems of security and privacy due vulnerabilities of technologies, carrying important consequences to the users of IoT technologies. In this context, we proposed a reference ontology (IoTSec) with security concepts of M2M communications to help find secure solutions to the IoT environment. We followed a literature review and MENTOR methodology to gather and harmonize security ontologies and knowledge of vulnerabilities, which are the root causes for problems of all information security. In order to elucidate our approach, we describe a case study about the applicability of IoTSec in the industrial scenario.