subject predicate object context
50803 Creator 33176de85668f22561aacf9a043c5537
50803 Creator c97cb5a4b00af57fd153f1594e29047d
50803 Creator e0b7fd620a538ed1e211c81a48d5a5fd
50803 Creator eb1a0182e6ea336167735f7009ed60e8
50803 Creator 9aa311f5592a2ae60e4a8796896a1815
50803 Date 2018-06-13
50803 Date 2018-07-18
50803 Is Part Of repository
50803 Is Part Of p23789638
50803 abstract As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or control. Collaborative security exploits the capabilities of these connected devices and opportunistically composes them in order to protect assets from potential harm. By dynamically composing these capabilities, collaborative security implements the security controls that satisfy both security and non-security requirements. However, this dynamic composition is often hampered by the heterogeneity of the devices available in the environment and the diversity of their behaviours. <br></br><br></br>In this paper we present a systematic, tool-supported approach for collaborative security where the analysis of requirements drives the opportunistic composition of capabilities in order to realise the appropriate security control in the operating environment. This opportunistic composition is supported through a combination of feature modelling and mediator synthesis. We use features and transition systems to represent and reason about capabilities and requirements. We formulate the selection of the optimal set of features to implement adequate security control as a multi-objective constrained optimisation problem and use constraint programming to solve it efficiently. The selected features are then used to scope the behaviours of the capabilities and thereby restrict the state space for synthesising the appropriate mediator. The synthesised mediator coordinates the behaviours of the capabilities to satisfy the behaviour specified by the security control. <br></br><br></br>Our approach ensures that the implemented security controls are the optimal ones given the capabilities available in the operating environment. We demonstrate the validity of our approach by implementing a Feature-driven medIation for Collaborative Security (FICS) tool and applying it to a collaborative robots case study.
50803 authorList authors
50803 issue 3
50803 status peerReviewed
50803 uri http://data.open.ac.uk/oro/document/632663
50803 uri http://data.open.ac.uk/oro/document/632664
50803 uri http://data.open.ac.uk/oro/document/632665
50803 uri http://data.open.ac.uk/oro/document/632666
50803 uri http://data.open.ac.uk/oro/document/632667
50803 uri http://data.open.ac.uk/oro/document/632668
50803 uri http://data.open.ac.uk/oro/document/660818
50803 volume 2
50803 type AcademicArticle
50803 type Article
50803 label Bennaceur, Amel ; Tun, Thein Than ; Bandara, Arosha K. ; Yu, Yijun and Nuseibeh, Bashar (2018). Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Transactions on Cyber-Physical Systems, 2(3), article no. 21.
50803 label Bennaceur, Amel ; Tun, Thein Than ; Bandara, Arosha K. ; Yu, Yijun and Nuseibeh, Bashar (2018). Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Transactions on Cyber-Physical Systems, 2(3), article no. 21.
50803 Title Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things
50803 in dataset oro