SlideShare a Scribd company logo
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture 
Amelie Gyrard 
Christian Bonnet (Eurecom, Mobile Communication) 
Karima Boudaoud (I3S, Security)
Semantic-based M2M Architecture 
Paper: A Machine-to-Machine Architecture to Merge Semantic Sensor Measurements [Gyrard et al., WWW 2013] 
- p 2
Machine-to-Machine (M3) framework: Build IoT applications 
- p 3 
http://www.sensormeasurement.appspot.com/
Motivation 
- p 4 
How to secure IoT architectures and applications? 
oCommunications 
oData 
oTechnologies employed 
oSecurity properties satisfied 
Time-consuming to be familiar with: 
oAttacks 
oSecurity mechanisms 
“Security by design” 
Reuse M3 for another purpose: security context 
A tool to help choose the best security mechanism fitting our needs
Reuse M3 to secure IoT applications or architectures 
- p 5
Security knowledge base 
- p 6 
Reusing security knowledge: 
o24 works referenced in various domains: 
IDS, Web, Sensor networks, Smart phones, Network communications, Cryptography 
oUse semantic web technologies (ontologies) 
Reuse domain knowledge 
Reasoning engine 
Flexibility 
Lack of best practices: 
oNot published online 
oDomain-specific, Not interlinked 
oHeterogeneous terms
LOV4IoT 
- p 7 
http://www.sensormeasurement.appspot.com/?p=ontologies
The STAC ontology 
8 
STAC (Security Toolbox: Attacks & Countermeasures) 
oOntology is a vocabulary to describe concepts and properties in a particular domain 
ohttp://securitytoolbox.appspot.com/stac# 
oReferenced by Linked Open Vocabularies (LOV) 
Help the developer choose security mechanisms to secure IoT applications.
How to secure heterogeneous technologies? 
- p 9
The STAC ontology 
10 
Paper: The STAC (Security Toolbox: Attacks & Countermeasures) ontology [Gyrard et al., WWW 2013]
The STAC application 
A semantic-based application to help the developer to design a secure software: 
The STAC ontology 
The user interface 
11
STAC template 
- p 12 
http://www.sensormeasurement.appspot.com/?p=stac
Security properties 
- p 13
- p 14 
STAC to secure communications 
http://www.sensormeasurement.appspot.com/?p=wireless 
http://www.sensormeasurement.appspot.com/?p=sensor
Evaluation 
Methodologies 
[Noy et al. 2001]: Ontology development 101: A guide to creating your first ontology 
Semantic web tools 
Oops, TripleChecker, RDF Validator, Vapour, 
Linked Open Vocabularies (LOV), Linked Open Data (LOD) 
24 security ontologies 
More than 14 ontologies are online 
User form: 
24 responses 
Updated STAC with new security domains 
- p 15
STAC evaluation form 
- p 16 
https://docs.google.com/forms/d/1NKiMQPVR6X6Reioud0-WBZu1bmo3T1Ah7PZm9De-apk/viewform
Conclusion & Future works 
M3 framework: 
Build IoT applications to reason on cross-domain data 
STAC 
–A security knowledge base 
–Helping developers choose security mechanisms to secure IoT applications. 
Linked Open Rules to share and reuse rules 
17
Thank you! 
- p 18 
We have more demonstrations for: 
STAC 
Linked Open Rules 
M3 framework 
gyrard@eurecom.fr 
http://www.sensormeasurement.appspot.com/

More Related Content

What's hot

Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Black Sea Summit — IT-conference in Odessa
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
ijasuc
 
Rsa report v14
Rsa report v14Rsa report v14
Rsa report v14
Nicholas Tan
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
ijasuc
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
Prevoty
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
IJNSA Journal
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
Andrei Patrascu
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
Daliya Spasova
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tom Janetscheck
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
EUBrasilCloudFORUM .
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
ijujournal
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
IJNSA Journal
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Ecway Technologies
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
fcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
fcleary
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
Vikas Jain
 

What's hot (20)

Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
Rsa report v14
Rsa report v14Rsa report v14
Rsa report v14
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 

Similar to An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of Things
Ghislain Atemezing
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Amélie Gyrard
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
Amélie Gyrard
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
IRJET Journal
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
AlAtfat
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
PhD Assistance
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
IJEACS
 
Br36413417
Br36413417Br36413417
Br36413417
IJERA Editor
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
Prakash Prasad ✔
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
IJECEIAES
 

Similar to An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture (20)

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of Things
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Br36413417
Br36413417Br36413417
Br36413417
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 

More from Amélie Gyrard

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Amélie Gyrard
 
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Amélie Gyrard
 
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Amélie Gyrard
 
Concept extraction from the web of things (3)
Concept extraction from the web of things (3)Concept extraction from the web of things (3)
Concept extraction from the web of things (3)
Amélie Gyrard
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Amélie Gyrard
 
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Amélie Gyrard
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of Vehicles
Amélie Gyrard
 
FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended
Amélie Gyrard
 
FiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontologyFiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontology
Amélie Gyrard
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
Amélie Gyrard
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
Amélie Gyrard
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Amélie Gyrard
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
Amélie Gyrard
 

More from Amélie Gyrard (13)

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
 
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
 
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...Defining iot.schema.org: Using Knowledge Extraction from  Existing IoT-based ...
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
 
Concept extraction from the web of things (3)
Concept extraction from the web of things (3)Concept extraction from the web of things (3)
Concept extraction from the web of things (3)
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
 
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of Vehicles
 
FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended FiCloud2016 lov4iot extended
FiCloud2016 lov4iot extended
 
FiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontologyFiCloud2016 lov4iot second life ontology
FiCloud2016 lov4iot second life ontology
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
 

Recently uploaded

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
anfaltahir1010
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 

Recently uploaded (20)

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 

An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture

  • 1. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture Amelie Gyrard Christian Bonnet (Eurecom, Mobile Communication) Karima Boudaoud (I3S, Security)
  • 2. Semantic-based M2M Architecture Paper: A Machine-to-Machine Architecture to Merge Semantic Sensor Measurements [Gyrard et al., WWW 2013] - p 2
  • 3. Machine-to-Machine (M3) framework: Build IoT applications - p 3 http://www.sensormeasurement.appspot.com/
  • 4. Motivation - p 4 How to secure IoT architectures and applications? oCommunications oData oTechnologies employed oSecurity properties satisfied Time-consuming to be familiar with: oAttacks oSecurity mechanisms “Security by design” Reuse M3 for another purpose: security context A tool to help choose the best security mechanism fitting our needs
  • 5. Reuse M3 to secure IoT applications or architectures - p 5
  • 6. Security knowledge base - p 6 Reusing security knowledge: o24 works referenced in various domains: IDS, Web, Sensor networks, Smart phones, Network communications, Cryptography oUse semantic web technologies (ontologies) Reuse domain knowledge Reasoning engine Flexibility Lack of best practices: oNot published online oDomain-specific, Not interlinked oHeterogeneous terms
  • 7. LOV4IoT - p 7 http://www.sensormeasurement.appspot.com/?p=ontologies
  • 8. The STAC ontology 8 STAC (Security Toolbox: Attacks & Countermeasures) oOntology is a vocabulary to describe concepts and properties in a particular domain ohttp://securitytoolbox.appspot.com/stac# oReferenced by Linked Open Vocabularies (LOV) Help the developer choose security mechanisms to secure IoT applications.
  • 9. How to secure heterogeneous technologies? - p 9
  • 10. The STAC ontology 10 Paper: The STAC (Security Toolbox: Attacks & Countermeasures) ontology [Gyrard et al., WWW 2013]
  • 11. The STAC application A semantic-based application to help the developer to design a secure software: The STAC ontology The user interface 11
  • 12. STAC template - p 12 http://www.sensormeasurement.appspot.com/?p=stac
  • 14. - p 14 STAC to secure communications http://www.sensormeasurement.appspot.com/?p=wireless http://www.sensormeasurement.appspot.com/?p=sensor
  • 15. Evaluation Methodologies [Noy et al. 2001]: Ontology development 101: A guide to creating your first ontology Semantic web tools Oops, TripleChecker, RDF Validator, Vapour, Linked Open Vocabularies (LOV), Linked Open Data (LOD) 24 security ontologies More than 14 ontologies are online User form: 24 responses Updated STAC with new security domains - p 15
  • 16. STAC evaluation form - p 16 https://docs.google.com/forms/d/1NKiMQPVR6X6Reioud0-WBZu1bmo3T1Ah7PZm9De-apk/viewform
  • 17. Conclusion & Future works M3 framework: Build IoT applications to reason on cross-domain data STAC –A security knowledge base –Helping developers choose security mechanisms to secure IoT applications. Linked Open Rules to share and reuse rules 17
  • 18. Thank you! - p 18 We have more demonstrations for: STAC Linked Open Rules M3 framework gyrard@eurecom.fr http://www.sensormeasurement.appspot.com/