Show simple item record

dc.contributor.authorAman, Waqas
dc.contributor.authorSnekkenes, Einar
dc.date.accessioned2018-04-11T06:17:21Z
dc.date.available2018-04-11T06:17:21Z
dc.date.created2016-02-29T13:48:45Z
dc.date.issued2015
dc.identifier.isbn9781908320520
dc.identifier.urihttp://hdl.handle.net/11250/2493519
dc.description.abstractAdaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.relation.ispartofThe 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)
dc.titleManaging Security Trade-offs in the Internet of Things using Adaptive Securitynb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber362-368nb_NO
dc.identifier.doi10.1109/ICITST.2015.7412122
dc.identifier.cristin1340937
dc.relation.projectNorges forskningsråd: 213131nb_NO
dc.description.localcode© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,18,21,80
cristin.unitnameNorwegian Information Security Lab
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record