SlideShare a Scribd company logo
1 of 18
Download to read offline
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture 
Amelie Gyrard 
Christian Bonnet (Eurecom, Mobile Communication) 
Karima Boudaoud (I3S, Security)
Semantic-based M2M Architecture 
Paper: A Machine-to-Machine Architecture to Merge Semantic Sensor Measurements [Gyrard et al., WWW 2013] 
- p 2
Machine-to-Machine (M3) framework: Build IoT applications 
- p 3 
http://www.sensormeasurement.appspot.com/
Motivation 
- p 4 
How to secure IoT architectures and applications? 
oCommunications 
oData 
oTechnologies employed 
oSecurity properties satisfied 
Time-consuming to be familiar with: 
oAttacks 
oSecurity mechanisms 
“Security by design” 
Reuse M3 for another purpose: security context 
A tool to help choose the best security mechanism fitting our needs
Reuse M3 to secure IoT applications or architectures 
- p 5
Security knowledge base 
- p 6 
Reusing security knowledge: 
o24 works referenced in various domains: 
IDS, Web, Sensor networks, Smart phones, Network communications, Cryptography 
oUse semantic web technologies (ontologies) 
Reuse domain knowledge 
Reasoning engine 
Flexibility 
Lack of best practices: 
oNot published online 
oDomain-specific, Not interlinked 
oHeterogeneous terms
LOV4IoT 
- p 7 
http://www.sensormeasurement.appspot.com/?p=ontologies
The STAC ontology 
8 
STAC (Security Toolbox: Attacks & Countermeasures) 
oOntology is a vocabulary to describe concepts and properties in a particular domain 
ohttp://securitytoolbox.appspot.com/stac# 
oReferenced by Linked Open Vocabularies (LOV) 
Help the developer choose security mechanisms to secure IoT applications.
How to secure heterogeneous technologies? 
- p 9
The STAC ontology 
10 
Paper: The STAC (Security Toolbox: Attacks & Countermeasures) ontology [Gyrard et al., WWW 2013]
The STAC application 
A semantic-based application to help the developer to design a secure software: 
The STAC ontology 
The user interface 
11
STAC template 
- p 12 
http://www.sensormeasurement.appspot.com/?p=stac
Security properties 
- p 13
- p 14 
STAC to secure communications 
http://www.sensormeasurement.appspot.com/?p=wireless 
http://www.sensormeasurement.appspot.com/?p=sensor
Evaluation 
Methodologies 
[Noy et al. 2001]: Ontology development 101: A guide to creating your first ontology 
Semantic web tools 
Oops, TripleChecker, RDF Validator, Vapour, 
Linked Open Vocabularies (LOV), Linked Open Data (LOD) 
24 security ontologies 
More than 14 ontologies are online 
User form: 
24 responses 
Updated STAC with new security domains 
- p 15
STAC evaluation form 
- p 16 
https://docs.google.com/forms/d/1NKiMQPVR6X6Reioud0-WBZu1bmo3T1Ah7PZm9De-apk/viewform
Conclusion & Future works 
M3 framework: 
Build IoT applications to reason on cross-domain data 
STAC 
–A security knowledge base 
–Helping developers choose security mechanisms to secure IoT applications. 
Linked Open Rules to share and reuse rules 
17
Thank you! 
- p 18 
We have more demonstrations for: 
STAC 
Linked Open Rules 
M3 framework 
gyrard@eurecom.fr 
http://www.sensormeasurement.appspot.com/

More Related Content

What's hot

International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) ijasuc
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)ijasuc
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Peace Asukwo
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudTom Janetscheck
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsEUBrasilCloudFORUM .
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)ijujournal
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...Ecway Technologies
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 

What's hot (20)

Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
Rsa report v14
Rsa report v14Rsa report v14
Rsa report v14
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 

Similar to An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsGhislain Atemezing
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionIRJET Journal
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Amélie Gyrard
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...IJECEIAES
 

Similar to An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture (20)

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of Things
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Br36413417
Br36413417Br36413417
Br36413417
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 

More from Amélie Gyrard

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...Amélie Gyrard
 
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....Amélie Gyrard
 
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...Amélie Gyrard
 
Concept extraction from the web of things (3)
Concept extraction from the web of things (3)Concept extraction from the web of things (3)
Concept extraction from the web of things (3)Amélie Gyrard
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)Amélie Gyrard
 
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...Amélie Gyrard
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesAmélie Gyrard
 
FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended Amélie Gyrard
 
FiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontologyFiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontologyAmélie Gyrard
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...Amélie Gyrard
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Amélie Gyrard
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Amélie Gyrard
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...Amélie Gyrard
 

More from Amélie Gyrard (13)

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
 
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
 
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
 
Concept extraction from the web of things (3)
Concept extraction from the web of things (3)Concept extraction from the web of things (3)
Concept extraction from the web of things (3)
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
 
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of Vehicles
 
FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended
 
FiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontologyFiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontology
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 

An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

  • 1. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture Amelie Gyrard Christian Bonnet (Eurecom, Mobile Communication) Karima Boudaoud (I3S, Security)
  • 2. Semantic-based M2M Architecture Paper: A Machine-to-Machine Architecture to Merge Semantic Sensor Measurements [Gyrard et al., WWW 2013] - p 2
  • 3. Machine-to-Machine (M3) framework: Build IoT applications - p 3 http://www.sensormeasurement.appspot.com/
  • 4. Motivation - p 4 How to secure IoT architectures and applications? oCommunications oData oTechnologies employed oSecurity properties satisfied Time-consuming to be familiar with: oAttacks oSecurity mechanisms “Security by design” Reuse M3 for another purpose: security context A tool to help choose the best security mechanism fitting our needs
  • 5. Reuse M3 to secure IoT applications or architectures - p 5
  • 6. Security knowledge base - p 6 Reusing security knowledge: o24 works referenced in various domains: IDS, Web, Sensor networks, Smart phones, Network communications, Cryptography oUse semantic web technologies (ontologies) Reuse domain knowledge Reasoning engine Flexibility Lack of best practices: oNot published online oDomain-specific, Not interlinked oHeterogeneous terms
  • 7. LOV4IoT - p 7 http://www.sensormeasurement.appspot.com/?p=ontologies
  • 8. The STAC ontology 8 STAC (Security Toolbox: Attacks & Countermeasures) oOntology is a vocabulary to describe concepts and properties in a particular domain ohttp://securitytoolbox.appspot.com/stac# oReferenced by Linked Open Vocabularies (LOV) Help the developer choose security mechanisms to secure IoT applications.
  • 9. How to secure heterogeneous technologies? - p 9
  • 10. The STAC ontology 10 Paper: The STAC (Security Toolbox: Attacks & Countermeasures) ontology [Gyrard et al., WWW 2013]
  • 11. The STAC application A semantic-based application to help the developer to design a secure software: The STAC ontology The user interface 11
  • 12. STAC template - p 12 http://www.sensormeasurement.appspot.com/?p=stac
  • 14. - p 14 STAC to secure communications http://www.sensormeasurement.appspot.com/?p=wireless http://www.sensormeasurement.appspot.com/?p=sensor
  • 15. Evaluation Methodologies [Noy et al. 2001]: Ontology development 101: A guide to creating your first ontology Semantic web tools Oops, TripleChecker, RDF Validator, Vapour, Linked Open Vocabularies (LOV), Linked Open Data (LOD) 24 security ontologies More than 14 ontologies are online User form: 24 responses Updated STAC with new security domains - p 15
  • 16. STAC evaluation form - p 16 https://docs.google.com/forms/d/1NKiMQPVR6X6Reioud0-WBZu1bmo3T1Ah7PZm9De-apk/viewform
  • 17. Conclusion & Future works M3 framework: Build IoT applications to reason on cross-domain data STAC –A security knowledge base –Helping developers choose security mechanisms to secure IoT applications. Linked Open Rules to share and reuse rules 17
  • 18. Thank you! - p 18 We have more demonstrations for: STAC Linked Open Rules M3 framework gyrard@eurecom.fr http://www.sensormeasurement.appspot.com/