an ontology-based approach for helping to secure the etsi machine-to-machine architecture

18
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture Amelie Gyrard Christian Bonnet (Eurecom, Mobile Communication) Karima Boudaoud (I3S, Security)

Upload: amelie-gyrard

Post on 05-Dec-2014

202 views

Category:

Software


2 download

DESCRIPTION

Slides presented at IEEE International Conference on Internet of Things 2014 (iThings), September 1-3, Taipei, Taiwan, 2014

TRANSCRIPT

Page 1: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

An Ontology-Based Approach for

Helping to Secure the ETSI

Machine-to-Machine Architecture

Amelie Gyrard

Christian Bonnet (Eurecom, Mobile

Communication)

Karima Boudaoud (I3S, Security)

Page 2: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Semantic-based M2M Architecture

Paper: A Machine-to-Machine Architecture to Merge Semantic Sensor Measurements

[Gyrard et al., WWW 2013]

- p 2

Page 3: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Machine-to-Machine (M3) framework:

Build IoT applications

- p 3 http://www.sensormeasurement.appspot.com/

Page 4: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Motivation

- p 4

How to secure IoT architectures and applications?

o Communications

o Data

o Technologies employed

o Security properties satisfied

Time-consuming to be familiar with:

o Attacks

o Security mechanisms

“Security by design”

Reuse M3 for another purpose: security context

A tool to help choose the best security mechanism

fitting our needs

Page 5: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Reuse M3 to secure IoT applications or

architectures

- p 5

Page 6: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Security knowledge base

- p 6

Reusing security knowledge:

o 24 works referenced in various domains:

IDS, Web, Sensor networks, Smart phones, Network

communications, Cryptography

o Use semantic web technologies (ontologies)

Reuse domain knowledge

Reasoning engine

Flexibility

Lack of best practices:

o Not published online

o Domain-specific, Not interlinked

o Heterogeneous terms

Page 7: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

LOV4IoT

- p 7 http://www.sensormeasurement.appspot.com/?p=ontologies

Page 8: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

The STAC ontology

8

STAC (Security Toolbox: Attacks & Countermeasures)

oOntology is a vocabulary to describe concepts and

properties in a particular domain

ohttp://securitytoolbox.appspot.com/stac#

oReferenced by Linked Open Vocabularies (LOV)

Help the developer choose security mechanisms to

secure IoT applications.

Page 9: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

How to secure heterogeneous

technologies?

- p 9

Page 10: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

The STAC ontology

10 Paper: The STAC (Security Toolbox: Attacks & Countermeasures) ontology

[Gyrard et al., WWW 2013]

Page 11: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

The STAC application

A semantic-based application to help the developer to

design a secure software:

The STAC ontology

The user interface

11

Page 12: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

STAC template

- p 12

http://www.sensormeasurement.appspot.com/?p=stac

Page 13: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Security properties

- p 13

Page 14: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

- p 14

STAC to secure communications

http://www.sensormeasurement.appspot.com/?p=wireless

http://www.sensormeasurement.appspot.com/?p=sensor

Page 15: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Evaluation

Methodologies

[Noy et al. 2001]: Ontology development 101:

A guide to creating your first ontology

Semantic web tools

Oops, TripleChecker, RDF Validator, Vapour,

Linked Open Vocabularies (LOV), Linked

Open Data (LOD)

24 security ontologies

More than 14 ontologies are online

User form:

24 responses

Updated STAC with new security domains

- p 15

Page 17: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Conclusion & Future works

M3 framework:

Build IoT applications to reason on cross-domain data

STAC

– A security knowledge base

– Helping developers choose security mechanisms to secure IoT

applications.

Linked Open Rules to share and reuse rules

17

Page 18: An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Thank you!

- p 18

We have more demonstrations for:

STAC

Linked Open Rules

M3 framework

[email protected]

http://www.sensormeasurement.appspot.com/