Detection of anomalies in data for monitoring of security components in the Internet of Things

The increasing urgency and expansion of information systems implementing the Internet of Things (IoT) concept determine the importance of the investigation in the field of protection mechanisms against a wide range of information security threats. The increased complexity of such investigation is determined by a low structuring and formalization of expert knowledge on IoT systems. The paper encompasses an approach to elicitation and use of expert knowledge on detection of anomalies in data as well as their usage as an input for automated means aimed at monitoring security components of IoT.

[1]  Igor V. Kotenko,et al.  Configuration-Based Approach to Embedded Device Security , 2012, MMM-ACNS.

[2]  Kevin Fu,et al.  Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.

[3]  Igor V. Kotenko,et al.  A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components , 2012, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[4]  N. R. Potlapally Topics in secure embedded system design , 2008 .

[5]  Patrick Schaumont,et al.  Securing embedded systems , 2006, IEEE Security & Privacy.

[6]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[7]  Thomas A. Henzinger,et al.  The Embedded Systems Design Challenge , 2006, FM.