dc.contributor.author | Aman, Waqas | |
dc.contributor.author | Snekkenes, Einar | |
dc.date.accessioned | 2018-04-11T06:17:21Z | |
dc.date.available | 2018-04-11T06:17:21Z | |
dc.date.created | 2016-02-29T13:48:45Z | |
dc.date.issued | 2015 | |
dc.identifier.isbn | 9781908320520 | |
dc.identifier.uri | http://hdl.handle.net/11250/2493519 | |
dc.description.abstract | Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.relation.ispartof | The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015) | |
dc.title | Managing Security Trade-offs in the Internet of Things using Adaptive Security | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 362-368 | nb_NO |
dc.identifier.doi | 10.1109/ICITST.2015.7412122 | |
dc.identifier.cristin | 1340937 | |
dc.relation.project | Norges forskningsråd: 213131 | nb_NO |
dc.description.localcode | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,18,21,80 | |
cristin.unitname | Norwegian Information Security Lab | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |