Difference between revisions of "IoTSec:T2.2"
From its-wiki.no
Habtamu.Abie (Talk | contribs) (→T2.2.3 Develop and implement adaptive security) |
Habtamu.Abie (Talk | contribs) (→T2.2.1 Train one PhD) |
||
Line 12: | Line 12: | ||
'''Sub Tasks''' | '''Sub Tasks''' | ||
=T2.2.1 Train one PhD= | =T2.2.1 Train one PhD= | ||
− | Adaptive security for the protection of IoT-based smart grids | + | On "Adaptive security for the protection of IoT-based smart grids" |
=T2.2.2 Implement event driven adaptive security= | =T2.2.2 Implement event driven adaptive security= |
Revision as of 13:38, 26 August 2015
Security in IoT for Smart Grids | |||||||
---|---|---|---|---|---|---|---|
|
T2.2 Adaptive Security
Task Title | Adopting and enhancing adaptive security for system of systems |
---|---|
WP | IoTSec:WP2 |
Lead partner | NR |
Leader | |
Contributors | HiG, NR, Ifi, ESmart Systems |
edit this task |
Objective
This task will review, extend and establish models for
- adaptive security
- real-time security monitoring of the entire grid operations
Category:Task |
Deliverables in T2.2 Adaptive Security
Title | Due month | Lead partner | Editor | Dissemination level | |
---|---|---|---|---|---|
D2.2.1 | Anticipatory adaptive security models (draft) | M12 | NR | Habtamu Abie | Restricted |
D2.2.2 | Anticipatory adaptive security | M24 | NR | Habtamu Abie | Public |
D2.2.3 | Adpative user interface report | M30 | NR | Habtamu Abie | Public |
D2.2.4 | Optimised adaptive security models | M48 | NR | Habtamu Abie | Public |
Sub Tasks
T2.2.1 Train one PhD
On "Adaptive security for the protection of IoT-based smart grids"
T2.2.2 Implement event driven adaptive security
Addresses events such as RFID-based physical access control or sensor-based voltage monitoring by adapting and extending the work in the MASSIF Project (http://www.massif-project.eu/) for utilising and modelling “events”
T2.2.3 Develop and implement adaptive security
Enhances the event-driven implementation and addresses the protection of IoT-based smart grids against evolutionary threats and attacks by
- using a combination of evolutionary theory and advanced behavioral analysis of big-real-data from IoT Smart Grids
- automating prevention, detection, and recovery activities at run-time through the adaptation cycle (monitoring, analyzing, planning, and execution) by re-configuring of control parameters and security goals
Results
- One PhD completed
- Working prototypes of adaptive security models and modules for simulation, test and operational environments
- D2.2 and D3.1 as technical reports
- 4 conference papers and 5 journal papers
T2.2.1 Implementation of adaptive security
Event driven adaptive security addresses events such as RFID-based physical access control or sensor-based voltage monitoring. An event-driven security security architecture is seen as a perfect candidate for real-time security monitoring of the entire grid operations. The basis of the work was addressed in the MASSIF Project (http://www.massif-project.eu/), and will be adapted and extended for utilising and modelling "events".
Adaptive security addresses the protection of "IoT-based smart grids" against evolutionary threats and attacks through the prediction and advanced behavioural analysis of big-real-data from IoT Smart Grids [32]. Our approach on adaptive security is based on [33], and security metrics methodology based on [34]. The adaptive security methodology addresses threats by increasing awareness and automating prevention, detection, and recovery from the failures of security and privacy protections at runtime by re-configuring control parameters and even changing structures and security goals. The objective is, therefore, to develop adaptive security mechanisms using the combination of evolutionary game theory and distributed behavioural analysis for Smart Grids. The expected outcome of this work are modules for use in the operational security.
Result:
- A working prototype implementing adaptive security for IoT in Smart Grids.
The expected outcome of this work are modules for use in the operational security Partners: NR, HIG Waqas Aman(IoTSec PostDoc)
Deliverable:
- 1 technical report,
- 2 conference papers