Enhancing Security in Ambient Intelligence: A STRIDE Threat Modeling Perspective

被引:0
作者
Hossain, Md Ismail [1 ]
Hasan, Ragib [1 ]
机构
[1] Univ Alabama Birmingham, Dept Comp Sci, Birmingham, AL 35294 USA
来源
2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT | 2023年
关键词
Ambient Intelligence; Security Analysis; STRIDE Threat Modeling; Smart Environment;
D O I
10.1109/WF-IOT58464.2023.10539377
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ambient intelligence (AmI) systems, which create smart and adaptive environments, offer numerous benefits but raise significant security concerns. In this paper, we present a security analysis for ambient intelligence using the Stride threat modeling approach. STRIDE, an acronym for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege, provides a systematic framework for identifying and mitigating threats in AmI environments. We focus on identifying and analyzing security risks specific to ambient intelligence systems, considering the unique characteristics and challenges they pose. By applying the STRIDE threat modeling approach, we uncover vulnerabilities and provide recommendations to enhance the security posture of various AmI components, such as sensors, data processing, communication channels, and user interactions. Furthermore, our research findings contribute to a better understanding of security issues in ambient intelligence and provide valuable insights for developers, system architects, and policymakers to design and deploy secure AmI systems.
引用
收藏
页数:6
相关论文
共 18 条
[11]   Ambient intelligence: A new multidisciplinary paradigm [J].
Remagnino, P ;
Foresti, GL .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2005, 35 (01) :1-6
[12]  
Sabit H, 2019, AUSTRA TELEC N A C
[13]  
Shostack A., 2008, MODSEC@ MoDELS, V2008, P35
[14]   Video security for ambient intelligence [J].
Snidaro, L ;
Micheloni, C ;
Chiavedale, C .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2005, 35 (01) :133-144
[15]  
Ucedavelez T, 2015, RISK CENTRIC THREAT MODELING: PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS, P1, DOI 10.1002/9781118988374
[16]  
Weber W., 2005, AMBIENT INTELLIGENCE
[17]  
Wuyts K., 2015, CW REPORTS
[18]   Threat modeling - A systematic literature review [J].
Xiong, Wenjun ;
Lagerstrom, Robert .
COMPUTERS & SECURITY, 2019, 84 :53-69