Lightweight Data-Security Ontology for IoT

Author:

Gonzalez-Gil PedroORCID,Martinez Juan AntonioORCID,Skarmeta Antonio F.ORCID

Abstract

Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer private data, lack of development in some aspects of security offer a wide field for improvement. The advent of Semantic Technologies for IoT offers a new set of possibilities and challenges, like data markets, aggregators, processors and search engines, which rise the need for security. New regulations, such as GDPR, also call for novel approaches on data-security, covering personal data. In this work, we present DS4IoT, a data-security ontology for IoT, which covers the representation of data-security concepts with the novel approach of doing so from the perspective of data and introducing some new concepts such as regulations, certifications and provenance, to classical concepts such as access control methods and authentication mechanisms. In the process we followed ontological methodologies, as well as semantic web best practices, resulting in an ontology to serve as a common vocabulary for data annotation that not only distinguishes itself from previous works by its bottom-up approach, but covers new, current and interesting concepts of data-security, favouring implicit over explicit knowledge representation. Finally, this work is validated by proof of concept, by mapping the DS4IoT ontology to the NGSI-LD data model, in the frame of the IoTCrawler EU project.

Funder

European Union

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference50 articles.

1. CISCO Visual Networking Index: Forecast and Trends, 2017–2022,2019

2. Ericsson Mobility Report,2019

3. Internet Security Threat Report (ISTR),2019

4. DDoS in the IoT: Mirai and Other Botnets

5. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

Cited by 22 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance;2023 IEEE International Conference on Big Data (BigData);2023-12-15

2. Video Steganography in IoT: Information Embedding using OpenCV and 2LSB;2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS);2023-06-14

3. Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms;ICST Transactions on Scalable Information Systems;2023-03-29

4. DynO-IoT: a dynamic ontology for provisioning semantic interoperability in internet of things;International Journal of Sensor Networks;2023

5. Relationship-Based AES Security Model for Social Internet of Things;Lecture Notes in Electrical Engineering;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3