Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun and Nuseibeh, Bashar
(2017).
|
PDF (Accepted Manuscript)
- Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (8MB) | Preview |
Google Scholar: | Look up in Google Scholar |
---|
Abstract
As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or control. Collaborative security exploits the capabilities of these connected devices and opportunistically composes them in order to protect assets from potential harm. By dynamically composing these capabilities, collaborative security implements the security controls that satisfy both security and non-security requirements. However, this dynamic composition is often hampered by the heterogeneity of the devices available in the environment and the diversity of their behaviours.
In this paper we present a systematic, tool-supported approach for collaborative security where the analysis of requirements drives the opportunistic composition of capabilities in order to realise the appropriate security control in the operating environment. This opportunistic composition is supported through a combination of feature modelling and mediator synthesis. We use features and transition systems to represent and reason about capabilities and requirements. We formulate the selection of the optimal set of features to implement adequate security control as a multi-objective constrained optimisation problem and use constraint programming to solve it efficiently. The selected features are then used to scope the behaviours of the capabilities and thereby restrict the state space for synthesising the appropriate mediator. The synthesised mediator coordinates the behaviours of the capabilities to satisfy the behaviour specified by the security control.
Our approach ensures that the implemented security controls are the optimal ones given the capabilities available in the operating environment. We demonstrate the validity of our approach by implementing a Feature-driven medIation for Collaborative Security (FICS) tool and applying it to a collaborative robots case study.
Item Type: | Journal Item | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Copyright Holders: | 2017 The Authors | ||||||||||||
ISSN: | 2378-962X | ||||||||||||
Project Funding Details: |
|
||||||||||||
Academic Unit/School: | Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications Faculty of Science, Technology, Engineering and Mathematics (STEM) |
||||||||||||
Research Group: | Health and Wellbeing PRA (Priority Research Area) Centre for Research in Computing (CRC) International Development & Inclusive Innovation |
||||||||||||
Item ID: | 50803 | ||||||||||||
Depositing User: | Amel Bennaceur | ||||||||||||
Date Deposited: | 05 Sep 2017 13:18 | ||||||||||||
Last Modified: | 20 Dec 2017 16:53 | ||||||||||||
URI: | http://oro.open.ac.uk/id/eprint/50803 | ||||||||||||
Share this page: | ![]() ![]() ![]() ![]() |
Download history for this item
These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.