| Literature DB >> 30213085 |
Bruno Augusti Mozzaquatro1, Carlos Agostinho2, Diogo Goncalves3, João Martins4, Ricardo Jardim-Goncalves5.
Abstract
The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous cybersecurity challenges as sensitive information is prone to be exposed to malicious users. This paper focuses on the improvement of IoT cybersecurity from an ontological analysis, proposing appropriate security services adapted to the threats. The authors propose an ontology-based cybersecurity framework using knowledge reasoning for IoT, composed of two approaches: (1) design time, which provides a dynamic method to build security services through the application of a model-driven methodology considering the existing enterprise processes; and (2) run time, which involves monitoring the IoT environment, classifying threats and vulnerabilities, and actuating in the environment ensuring the correct adaptation of the existing services. Two validation approaches demonstrate the feasibility of our concept. This entails an ontology assessment and a case study with an industrial implementation.Entities:
Keywords: Industry 4.0; Internet of Things; cybersecurity framework; security ontology; security service provisioning
Year: 2018 PMID: 30213085 PMCID: PMC6163186 DOI: 10.3390/s18093053
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Potential security challenges for the IoT ecosystem.
Figure 2The proposed ontology-based cybersecurity framework.
Number of classes, properties, axioms and annotations in the IoTSec ontology.
| Ontology Metric | # | Ontology Metric | # |
|---|---|---|---|
| Classes | 228 | Logical Axioms | 1895 |
| Object Properties | 24 | Annotations | 1418 |
| Data Properties | 7 | Individuals | 607 |
Figure 3The logical relation of the application of implementation technologies and the proposed framework. BPMN, Business Process Model and Notation; IDMEF, Intrusion Detection Message Exchange Format; IDS, Intrusion Detection System; SWRL, Semantic Web Rule Language.
Figure 4Average scores for the IoTSec ontology using OQuaRE metrics.
Figure 5Industrial scenario in a factory shop floor.
Figure 6Graphical representation of the inference rule R5.
Figure 7Results from the application of an inference rule.
Figure 8Results from the formal question to the cybersecurity framework.
Figure 9Processing time of a query with n instances in the results.