Ontology-Based Automation of Security Guidelines for Smart Homes

被引:0
作者
Khan, Yasir Imtiaz [1 ]
Ndubuaku, Maryleen U. [2 ]
机构
[1] Coventry Univ, Ctr Mobil & Transport, Coventry, W Midlands, England
[2] Coventry Univ, Fac Engn Elect & Comp, Coventry, W Midlands, England
来源
2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT) | 2018年
关键词
Ontology; Security guideline; OWL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The introduction of Internet of Things has attracted increasing number of security risks to the smart home due to the continual exposure of devices to remote network. As a last line of defence, security guidelines are issued to the user to supplement network and manufacturer level risk mitigation efforts. While these guidelines address specific security issues, they are varied and lacking in structure for common representation, understanding and sharing among the smart home community (vendors, developers and household). The smart home user as the executor of these guidelines is faced with additional responsibility that can make the smart home management a daunting task. In this work, an ontology is proposed to represent knowledge about the security guidelines for interoperability and understanding among the smart home actors. Further to this, a context-based ontology is developed, which adapts to changing contextual information like user context and physical context. We highlight different use cases of security guidelines and discuss how the context-based ontology can help the user perform these guidelines automatically.
引用
收藏
页码:35 / 40
页数:6
相关论文
共 23 条
[1]  
Alcazar Vargas F., 2012, THESIS
[2]  
[Anonymous], 2004, RDF VOCABULARY DESCR
[3]  
[Anonymous], S US PRIV SEC SOUPS
[4]  
[Anonymous], 2014, BUSINESS INSIDER
[5]  
Barcena MarioBallano., 2015, INSECURITY INTERNET
[6]  
Cangeloso S., 2013, EXTREMETECH PHILIPS
[7]   An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes [J].
Chen, Liming ;
Nugent, Chris ;
Okeyo, George .
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2014, 44 (01) :92-105
[8]  
Edwards W.K., 2008, Proceedings of the 2007 Workshop on New Security Paradigms, P33
[9]  
Fenz S., 2009, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, P183
[10]  
FENZ S, 2009, BIS, V21, P49