6 research outputs found

    Applying an unified access control for IoT-based Intelligent Agent Systems

    Get PDF
    IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), 19/10/2015-21/10/2015, Roma, ItaliaThe rise of the Internet of Things (IoT) paradigm has allowed the design and development of new services interconnecting heterogeneous devices. However, the complexity of these new systems hasn"t been followed by the increase of intelligence and reasoning of the devices connected. On the other hand, intelligent agent systems have developed precisely these characteristics so the combination of both paradigms by modelling intelligent agents in IoT devices is a very promising approach that will enable a more powerful and smart IoT. The interconnection of agents through a Internet-based network implies addressing critical issues that affect all network communications, such as security, privacy and access control, specially given the sensitivity of the information exchanged by agents. In this paper, we propose the application of User-Managed Access (UMA) to provide an unified access control schema for an heterogeneous hybrid architecture of IoT devices and intelligent agents.Ministerio de EconomĂ­a y Competitivida

    An Architecture for Securing Communications in Critical Infrastructure

    Get PDF
    7th International Conference on Data Communication Networking - DCNET 2016, , 26/07/2016-28/07/2016, Lisboa, PortugalThe disruption of communications in critical infrastructures could have a serious impact on the health, safety, security or economic well-being of citizens or even prevent the effective functioning of governments or other agencies. For this reason, in this paper we present a distributed architecture, named CYBERSENS, aimed at preventing, early detecting, and mitigating cyber attacks to critical infrastructure networks. CYBERSENS is an advanced IDS/IPS system specially tailored for securing communications in critical infrastructures. It"s federated architecture, the combination of misuse detection techniques and novel anomaly detection approaches, and the inclusion of mechanisms for self-obfuscation and self-protection, makes our proposal specially suitable for these scenarios.European Commissio

    TOWER: Topology Optimization for netWork Enhanced Resilience

    Get PDF
    7th International Conference on Data Communication Networking - DCNET 2016 , 26/07/2016-28/07/2016, Lisboa, PortugalNowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact on other systems including critical infrastructures. In this work, we propose TOWER, a framework for the provision of adequate strategies to optimize service provision and system resilience in CNIs. The goal of TOWER is being able to compute new network topologies for CNIs under the event of malicious attacks. For doing this, TOWER takes into account a risk analysis of the CNI, the results from a cyber-physical IDS and a multilayer model of the network, for taking into account all the existing dependences. TOWER analyses the network structure in order to determine the best strategy for obtaining a network topology, taking into account the existing dependences and the potential conflicting interests when not all requirements can be met. Finally, we present some lines for further development of TOWER.European Commissio

    TOWER: Topology Optimization for netWork Enhanced Resilience

    No full text
    7th International Conference on Data Communication Networking - DCNET 2016 , 26/07/2016-28/07/2016, Lisboa, PortugalNowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact on other systems including critical infrastructures. In this work, we propose TOWER, a framework for the provision of adequate strategies to optimize service provision and system resilience in CNIs. The goal of TOWER is being able to compute new network topologies for CNIs under the event of malicious attacks. For doing this, TOWER takes into account a risk analysis of the CNI, the results from a cyber-physical IDS and a multilayer model\ud of the network, for taking into account all the existing dependences. TOWER analyses the network structure in order to determine the best strategy for obtaining a network topology, taking into account the existing dependences and the potential conflicting interests when not all requirements can be met. Finally, we present some lines for further development of TOWER.European Commissio

    Applying an unified access control for IoT-based Intelligent Agent Systems

    No full text
    IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), , 19/10/2015-21/10/2015, Roma, ItaliaThe rise of the Internet of Things (IoT) paradigm\ud has allowed the design and development of new services interconnecting\ud heterogeneous devices. However, the complexity\ud of these new systems hasn"t been followed by the increase of\ud intelligence and reasoning of the devices connected. On the\ud other hand, intelligent agent systems have developed precisely\ud these characteristics so the combination of both paradigms by\ud modelling intelligent agents in IoT devices is a very promising\ud approach that will enable a more powerful and smart IoT. The interconnection\ud of agents through a Internet-based network implies\ud addressing critical issues that affect all network communications,\ud such as security, privacy and access control, specially given the\ud sensitivity of the information exchanged by agents. In this paper,\ud we propose the application of User-Managed Access (UMA) to\ud provide an unified access control schema for an heterogeneous\ud hybrid architecture of IoT devices and intelligent agents.Ministerio de EconomĂ­a y Competitivida

    An Architecture for Securing Communications in Critical Infrastructure

    No full text
    7th International Conference on Data Communication Networking - DCNET 2016, , 26/07/2016-28/07/2016, Lisboa, PortugalThe disruption of communications in critical infrastructures could have a serious impact on the health, safety, security or economic well-being of citizens or even prevent the effective functioning of governments or other agencies. For this reason, in this paper we present a distributed architecture, named CYBERSENS, aimed at preventing, early detecting, and mitigating cyber attacks to critical infrastructure networks. CYBERSENS is an advanced IDS/IPS system specially tailored for securing communications in critical infrastructures. It"s federated architecture, the combination of misuse detection techniques and novel anomaly detection approaches, and the inclusion of mechanisms for self-obfuscation and self-protection, makes our proposal specially suitable for these scenarios.European Commissio
    corecore