SenSecPhD
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Project: SenSecPhD |
---|
Sensor Security for the Internet of People, Things and Services |
Web: | http://cwi.unik.no/wiki/SenSecPhD |
---|---|
Project leader | Seraj Fayyad |
Project Participants | |
Start Date | 2014/02/20 |
End Date | 2018/01/19 |
Supported by | NFR, Movation |
Objective | create PhD -... copy from PhD descritpion |
Research Domain | EHealth, Internet - IoPTS |
Keywords | Information Security, Security |
Factpage of Project SenSecPhD
Equipment used in project: SenSecPhD/Equipment
About the Sensor Security (SenSec) project
The leading concept of the SensorSecurity project is to develop, extend and apply a security methodology for the Internet of People, Things and Services. We are at the beginning of a new age of business, where dynamic processes and information from sensors systems are the driving forces for business and business collaborations. While today’s Internet-based service world is based on collaborations between entities, the future business will be based on dynamic interaction between entities. One of the real challenges on this way ahead is the disappearing borders between companies, and the exchange of sensor- and process-based information between the entities. Given the second trend of dynamic modelling creating autonomous decisions is the lack of a measurable security when exchanging information. «Is the information that your system receives from one of the suppliers (or competitors) reliable?» is one of the key questions which you need to answer if your process or business model depends on those data.
Sensor security is today mainly addressed through an integrated assessment, where the sensors are treated as part of a system, deployed in a specific environment, being attacked based on an assumed attack scenario, addressing known vulnerabilities in the operative system, the communication or the way of operation. This traditional approach has a series of shortcomings, starting from the limited applicability in changing environments, the restriction to assumed attack scenarios, the reuse of data in collaborating environments and the missing applicability in a system of systems.
Novel research as suggested by the ARTEMIS joint undertaking in the SHIELD projects1 suggest a distributed architecture, with semantic descriptions of each aspect and a semantic overlay for composable security. The descriptions include attack capabilities, security functionality, system components, and the system of systems. The ambitious methodology suggested in SHIELD needs to be evaluated against other trends in establishing secured infrastructures for sensors networks, including sensor reconfiguration, control through secure overlay middleware, and assessment based on cognitive computing. The main objective of the SensorSecurity project is to establish a novel methodology for security assessment in sensor networks. This main objective is addressed through the following sub-objectives:
- Establish a state-of-the-art in methodologies for sensor security
- Evaluate the methodologies with respect to industrial applicability in dynamic collaboration environments
- Based on the evaluation, select a security methodology for further work
- Apply the selected methodology for selected use cases in the arena activities eHealth and ITS2
- Suggest extensions to the selected methodology
- Implement and evaluate the advanced methodology
- Publish the results in selected conferences and journals
- Provide a PhD thesis summarising the research
Open Action Items
Meetings
SenSecPhD related Meeting(s):- Smart ICT 2019 (onThis property is a special property in this wiki. 26 September 2019)
- Security in IoT - Project Proposal (onThis property is a special property in this wiki. 7 January 2015)
- PhD-startup-methodology (onThis property is a special property in this wiki. 24 February 2014)