SlideShare ist ein Scribd-Unternehmen logo
1 von 80
Downloaden Sie, um offline zu lesen
Web site: https://sites.google.com/view/iot-cps-2019/program?authuser=0
Trends on Data Graphs & Security
for the Internet of Things
Speaker:
Dr. Ghislain Atemezing
Research & Development Director, MONDECA, Paris, France
Credits:
Dr. Amelie Gyrard
Kno.e.sis, Wright State University, Ohio, USA
Agenda
● Motivation
● Background: Knowledge Graphs (KG), Semantic Web, Ontologies, etc.
● KGs for IoT
● Semantic Web approaches to security
○ Security Knowledge Graph with
STAC (Security Toolbox: Attacks & Countermeasures)
○ Ontology catalog for IoT Security
○ Helping IoT developers secure their applications
○ STAC demo
○ STAC evaluation
● Ontology Quality with Perfecto applied for security
● Take away message
Motivation
Why do we Need to Secure IoT/CPS Applications?
We can control
people’s life otherwise!
https://www.ahajournals.org/doi/full/10.1161/CIRCULATIONAHA.118.037331
Why do we Need to Secure IoT/CPS Applications?
Classification of Cybersecurity from Europol
● Class of incident
● Type of incident for
each class
● Description of the
incident
OWASP - Top 10 IoT Vulnerabilities
● I1 Weak Guessable, or Hardcoded Passwords
● I2 Insecure Network Services
● I3 Insecure Ecosystem Interfaces
● I4 Lack of Secure Update Mechanism
● I5 Use of Insecure or Outdated Components
● I6 Insufficient Privacy Protection
● I7 Insecure Data Transfer and Storage
● I8 Lack of Device Management
● I9 Insecure Default Settings
● I10 Lack of Physical Hardening
https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf
Access Control Models in IoT/WoT Environment (1)
● ACS authenticates the user and
grants her the appropriate access
token, allowing her to access the
Thing’s resources for a certain period
of time or permanently depending on
the deployed policy,
● Better scalability and privacy in the
system.
● Complicated to implement in
constrained environment since the
Things themselves needs to check the
received access token
De-centralized Architecture
Access Control Models in IoT/ WoT Environment (2)
● User’s requests go through an access
control server that authorizes and
relays them to the right destination.
● This model is interesting in the WoT
since all the complexity can be carried
out by the server.
● Single point of failure, impersonation
and privacy problems since all the
requests and eventually responses
are monitored by the server
Centralized Architecture
Quizz Slide
Have you already heard about
Knowledge Graph (KG)?
What is a KG?
“A graph of data with the intention
to encode knowledge”
“Link things that were never connected before using
graph paradigm to transform business.”
“Knowledge that is represented in machine
readable format for data interoperability and
discovery”
Google’s Knowledge Graph (2012)
Video (2 mins 44): https://youtu.be/mmQl6VGvX-c
Blog: https://googleblog.blogspot.com/2012/05/introducing-knowledge-graph-things-not.html
Directed labeled graph
We are Using those Technologies Everyday
Technologies used in the
search engine back-end
Quizz Slide
Who already heard about:
Knowledge Graphs for
Internet of Things (IoT)
Graph of Things - Le-Phuoc et al.
Video (10 mins 33): https://www.youtube.com/watch?v=kNm6PlrBTi4
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
Graph of Things
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
● Temperature
● Wind
● Traffic Camera
● Airport
● Flight
● Ship
● Harbour
● Travel Camera
● Twitter
● Bike Station
Water Level
● Metro Station
Graph of Things
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
Real-time -> temporal
and spatial aspects
Big Data Challenges:
Big volume, fast
real-time update and
messy data sources
IBM IoT KG
Video: https://www.youtube.com/watch?v=ebBTdH62yLg
Schema.org: Structured data on the Web by Google
iot.schema.org - Ongoing Extension
Ongoing
Extension
http://iotschema.org/
iot.schema.org
http://iotschema.org/Capability
Extension for IoT
domain. How to align
with other existing
ontologies?
iot.schema.org - Ongoing Extension
How to decide
which concepts to
include?
http://iotschema.org/AirConditionerhttp://iotschema.org/Capability
iot.schema.org - Ongoing Extension
How to decide
which concepts to
include?
http://iotschema.org/TemperatureSensinghttp://iotschema.org/Capability
Modeling the Security Domain
with Knowledge Graphs
STAC
(Security Toolbox:
Attack & Countermeasure)
● Creating a Knowledge Graph for
better interoperability and reuse
● Based on existing works in the
field
● Collecting data from papers from
2005 to 2013
● Initial version during Gyrard’s
PhD thesis in 2013
The STAC Security Knowledge Graph
STAC: The First Security Knowledge Graph
Referenced by LOV
STAC referenced on LOV
April 2019
STAC Ontology and Dataset
STAC Ontology: http://securitytoolbox.appspot.com/stac#
STAC Dataset: http://securitytoolbox.appspot.com/stac-dataset
Technology Concept and Sub-Classes
Web Attacks Sub-Classes and Axioms
Obviously the ontology
to describe the security
domain must evolved!
Security Mechanisms Sub-Classes
Classification of Attacks and Security Mechanisms
Specific to Sensor Networks
According to the OSI Model
Security Properties for
Sensor Security Mechanisms
Describing LLSP Security Mechanism in RDF/XML
An ontology catalog for
(IoT)-Security
LOV4IoT: An ontology Catalog for IoT
Demo: http://lov4iot.appspot.com/?p=ontologies
33 ontologies for
security referenced
LOV4IoT-Security
Demo: http://lov4iot.appspot.com/?p=lov4iot-security
A Potential Solution to Help
Developers
Secure IoT Applications
Motivation for IoT Developers
● How to secure IoT architectures and applications?
○ Communications
○ Data
○ Technologies employed
○ Security properties satisfied
● Time-consuming to be familiar with:
○ Attacks
○ Security Mechanisms
● “Security by design”
=> Reuse the Machine-to-Machine Framework for another purpose: the security
context
=> A tool to help choose the best security mechanism fitting our needs
Assisting Developers
in Securing IoT Apps with STAC
S4AC / Fine-Grained Access Control Policies
● Lightweight vocabulary to create fine-grained access control policies for
Linked Data.
● Share security information specifying the access control conditions under
which the data is accessible.
S4AC: http://ns.inria.fr/s4ac/v1/s4ac_v1.html
Shi3ld: Context-Aware Authorization for Graph Stores
● Works on Named Graphs
● Step 0. The user defines the
Access Policy
● Step 1. Query Contextualization
● Step 2. Access Policy
Evaluation
● Step 3. Query Execution
http://wimmics.inria.fr/projects/shi3ld/
STAC Demo Online: Assisting
Developers in Securing IoT Apps
Demo: http://securitytoolbox.appspot.com/
STAC Application
STAC Application (Video)
STAC Demo: https://www.youtube.com/watch?v=vXYYbwM0xvY
Demo: http://securitytoolbox.appspot.com/?p=stac
Selecting a Technology
Numerous
technologies and
security
mechanisms to use
in IoT
Searching Attacks and Countermeasures
for a Specific Technology
Demo: http://securitytoolbox.appspot.com/?p=stac
Cryptography
Demo: http://securitytoolbox.appspot.com/?p=cryptography
Tooltip to
provide more
explanations
Security Properties
Demo: http://securitytoolbox.appspot.com/?p=security_property
All security mechanisms
addressing the
authentication security
property
Security Properties
Demo: http://securitytoolbox.appspot.com/?p=security_property
Security for GSM/ 2G
Demo: http://securitytoolbox.appspot.com/?p=cellular
Security for GPRS/ 2.5G & UMTS/ 3G
Demo: http://securitytoolbox.appspot.com/?p=cellular
Demo: http://securitytoolbox.appspot.com/?p=attack
Attacks & Countermeasures
STAC Application Template: GUI
Example: An health application needs to be secured!
STAC Application Template:
Data Graph (Back-end)
STAC Evaluation
● Methodologies:
○ Ontology Development 101: A guide to creating your
first ontology [Noy et al. 2001]
● Semantic Web tools:
○ Oops, TripleChecker, RDF Validators, Vapour
○ Linked Open Vocabularies (LOV)
○ Linked Open Data (LOD)
● 24 security ontologies
○ More than 14 ontologies are online
● Evaluation user form:
○ 24 responses
=> STAC improved with new security domains
Evaluation: STAC Ontology on LOV
Evaluation: STAC dataset on DataHub
https://old.datahub.io/dataset/stac
STAC Evaluation
STAC Evaluation
STAC Evaluation
STAC evaluation form:
https://docs.google.com/forms/d/e/1FAIpQLScEoyupQi69NjNWygb1
I7lfJ6ClSQ6JrVY3YjeFo0h31j7K5g/viewform?usp=sf_link
STAC evaluation results:
https://docs.google.com/spreadsheets/d/1G21C2-uv47jeulGZnVdUq
n0M2MR9gyejw8QpWsc4JHE/edit?usp=sharing
Ontology/
Knowledge Graph Quality
with PerfectO
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Selecting the
security domain!
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Selecting one specific
ontology!
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic integration with
ontology quality tools
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic ontology
visualization
Automatic Integration with
Ontology Visualization
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic ontology
syntax validator
Is your Security Ontology
not Referenced yet on LOV4IoT?
Writing your ontology
URL here!
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Evaluating your Security Ontology
Automatic integration with
ontology quality tools
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Take Away Message
● We can’t stop the IoT/WoT revolution.
● Users are worried about their personal data that they will share
with the smart objects and more importantly who can access
them.
● Need to implement strong security mechanisms to protect their
data inside and outside the infrastructure.
● Semantic technologies offer standards (ontologies, rules, RDF
models) to leverage existing security issues in IoT for better
interoperability mostly in identification, or to data
control/access.
Take Away Message!
Challenges
● Semantic Web technologies to support both data
producers and consumers in understanding, combining
and interpreting policies in a meaningful and valuable
way.
● Semantic Web technologies address issues such as
appropriation, distortion, or challenges associated with
invasion.
Bibliography
● An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture.
IEEE International Conference on Internet of Things 2014 (iThings), 2014
PDF, Paper via IEEE, Slides
● The STAC (Security Toolbox: Attacks & Countermeasures) ontology
WWW 2013, 22nd International World Wide Web Conference, Poster, Brazil
Paper, Poster
● Chapter 5 Security Toolbox: Attacks & Countermeasures (STAC)
PhD: Designing Cross-Domain Semantic Web of Things Applications (2015)
Thesis's defense, Eurecom, Sophia Antipolis, 24 April 2015
PhD thesis (has been selected as one of the 10 nominees for Best PhD Thesis Price - Telecom
ParisTech 2015 - France)
Slides, Demo
Bibliography
● Semantic Web Methodologies, Best Practices and Ontology Engineering Applied to Internet of
Things
IEEE World Forum on Internet of Things (WF-IoT), 2015
PDF, Paper via IEEE, Slides
● A survey and analysis of ontology-based software tools for semantic interoperability in IoT and
WoT landscapes.
IEEE World Forum on Internet of Things (WF-IoT), 2018
PDF
● Privacy, Security and Policies: A review of Problems and Solutions with Semantic Web
Technologies,
SWJ (2018)
● Social Semantic Web Access Control.
International Workshop Social Data on the Web (SDoW), 2011.
● An Access Control Model for Linked Data
International IFIP Workshop on Semantic Web & Web Semantics (SWWS), 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Towards Automating Data Narratives
Towards Automating Data NarrativesTowards Automating Data Narratives
Towards Automating Data Narrativesdgarijo
 
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...dgarijo
 
Some "challenges" on the open-source/open-data front
Some "challenges" on the open-source/open-data frontSome "challenges" on the open-source/open-data front
Some "challenges" on the open-source/open-data frontGreg Landrum
 
Km4City Smart City API: an integrated support for mobility services
Km4City Smart City API: an integrated support for mobility servicesKm4City Smart City API: an integrated support for mobility services
Km4City Smart City API: an integrated support for mobility servicesPaolo Nesi
 
Smart Cloud Engine and Solution based on Knowledge Base
Smart Cloud Engine and Solution based on Knowledge BaseSmart Cloud Engine and Solution based on Knowledge Base
Smart Cloud Engine and Solution based on Knowledge BasePaolo Nesi
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Universita della Calabria,
 
第1回バイオインフォマティクスデータ可視化セミナー@Riken
第1回バイオインフォマティクスデータ可視化セミナー@Riken第1回バイオインフォマティクスデータ可視化セミナー@Riken
第1回バイオインフォマティクスデータ可視化セミナー@RikenKeiichiro Ono
 
Developing Smart Cities Services through Semantic Analysis of Social Streams
Developing Smart Cities Services through Semantic Analysis of Social StreamsDeveloping Smart Cities Services through Semantic Analysis of Social Streams
Developing Smart Cities Services through Semantic Analysis of Social StreamsCataldo Musto
 
Graph Networks for Object Recognition
Graph Networks for Object RecognitionGraph Networks for Object Recognition
Graph Networks for Object RecognitionVaticle
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...hacktivity
 
Automatic Selection of Linked Open Data features in Graph-based Recommender S...
Automatic Selection of Linked Open Data features in Graph-based Recommender S...Automatic Selection of Linked Open Data features in Graph-based Recommender S...
Automatic Selection of Linked Open Data features in Graph-based Recommender S...Cataldo Musto
 
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...Cataldo Musto
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Drapergeetachauhan
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev festgeetachauhan
 
DFlow is dead. Long live Tako!
DFlow is dead. Long live Tako!DFlow is dead. Long live Tako!
DFlow is dead. Long live Tako!Roberto Minelli
 
Data extraction tools
Data extraction toolsData extraction tools
Data extraction toolsCristian Ruiz
 
EclipseCon France 2015 - Science Track
EclipseCon France 2015 - Science TrackEclipseCon France 2015 - Science Track
EclipseCon France 2015 - Science TrackBoris Adryan
 
The Italian Hate Map: semantic content analytics for social good
The Italian Hate Map: semantic content analytics for social goodThe Italian Hate Map: semantic content analytics for social good
The Italian Hate Map: semantic content analytics for social goodCataldo Musto
 

Was ist angesagt? (19)

Towards Automating Data Narratives
Towards Automating Data NarrativesTowards Automating Data Narratives
Towards Automating Data Narratives
 
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
 
Some "challenges" on the open-source/open-data front
Some "challenges" on the open-source/open-data frontSome "challenges" on the open-source/open-data front
Some "challenges" on the open-source/open-data front
 
Km4City Smart City API: an integrated support for mobility services
Km4City Smart City API: an integrated support for mobility servicesKm4City Smart City API: an integrated support for mobility services
Km4City Smart City API: an integrated support for mobility services
 
Smart Cloud Engine and Solution based on Knowledge Base
Smart Cloud Engine and Solution based on Knowledge BaseSmart Cloud Engine and Solution based on Knowledge Base
Smart Cloud Engine and Solution based on Knowledge Base
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
第1回バイオインフォマティクスデータ可視化セミナー@Riken
第1回バイオインフォマティクスデータ可視化セミナー@Riken第1回バイオインフォマティクスデータ可視化セミナー@Riken
第1回バイオインフォマティクスデータ可視化セミナー@Riken
 
Developing Smart Cities Services through Semantic Analysis of Social Streams
Developing Smart Cities Services through Semantic Analysis of Social StreamsDeveloping Smart Cities Services through Semantic Analysis of Social Streams
Developing Smart Cities Services through Semantic Analysis of Social Streams
 
Graph Networks for Object Recognition
Graph Networks for Object RecognitionGraph Networks for Object Recognition
Graph Networks for Object Recognition
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
 
Automatic Selection of Linked Open Data features in Graph-based Recommender S...
Automatic Selection of Linked Open Data features in Graph-based Recommender S...Automatic Selection of Linked Open Data features in Graph-based Recommender S...
Automatic Selection of Linked Open Data features in Graph-based Recommender S...
 
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Draper
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev fest
 
DFlow is dead. Long live Tako!
DFlow is dead. Long live Tako!DFlow is dead. Long live Tako!
DFlow is dead. Long live Tako!
 
Data extraction tools
Data extraction toolsData extraction tools
Data extraction tools
 
EclipseCon France 2015 - Science Track
EclipseCon France 2015 - Science TrackEclipseCon France 2015 - Science Track
EclipseCon France 2015 - Science Track
 
Jinank Jain
Jinank JainJinank Jain
Jinank Jain
 
The Italian Hate Map: semantic content analytics for social good
The Italian Hate Map: semantic content analytics for social goodThe Italian Hate Map: semantic content analytics for social good
The Italian Hate Map: semantic content analytics for social good
 

Ähnlich wie Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Things (IoT), Cyber-Physical-Systems (CPS)

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsGhislain Atemezing
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
N01 cloud computing_and_gae
N01 cloud computing_and_gaeN01 cloud computing_and_gae
N01 cloud computing_and_gaeSun-Jin Jang
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology InnovationsImesh Gunaratne
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTCapgemini
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...Amélie Gyrard
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
19507334023_NURISMA Z.D._PPT P PRADANA.pptx
19507334023_NURISMA Z.D._PPT P PRADANA.pptx19507334023_NURISMA Z.D._PPT P PRADANA.pptx
19507334023_NURISMA Z.D._PPT P PRADANA.pptxnurismazenitad12
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
 
Security and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectSecurity and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectAndreas Schreiber
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
Industry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
Industry4.0 IoT Vincent Thavonekham - Azure Day UkraineIndustry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
Industry4.0 IoT Vincent Thavonekham - Azure Day UkraineFactoVia
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection BotIRJET Journal
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deckEtheralabs
 

Ähnlich wie Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Things (IoT), Cyber-Physical-Systems (CPS) (20)

Trends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of ThingsTrends on Data Graphs & Security for the Internet of Things
Trends on Data Graphs & Security for the Internet of Things
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
N01 cloud computing_and_gae
N01 cloud computing_and_gaeN01 cloud computing_and_gae
N01 cloud computing_and_gae
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoT
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
19507334023_NURISMA Z.D._PPT P PRADANA.pptx
19507334023_NURISMA Z.D._PPT P PRADANA.pptx19507334023_NURISMA Z.D._PPT P PRADANA.pptx
19507334023_NURISMA Z.D._PPT P PRADANA.pptx
 
Butler
ButlerButler
Butler
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Security and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectSecurity and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid Project
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
Industry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
Industry4.0 IoT Vincent Thavonekham - Azure Day UkraineIndustry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
Industry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 

Mehr von Amélie Gyrard

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...Amélie Gyrard
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)Amélie Gyrard
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesAmélie Gyrard
 
Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Amélie Gyrard
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...Amélie Gyrard
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Amélie Gyrard
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
 
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Amélie Gyrard
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Amélie Gyrard
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...Amélie Gyrard
 

Mehr von Amélie Gyrard (11)

Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Slides chase 2019  connected health conference - thursday 26 september 2019 -...Slides chase 2019  connected health conference - thursday 26 september 2019 -...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
 
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Personalized health knowledge graph   ckg workshop - iswc 2018 (2)Personalized health knowledge graph   ckg workshop - iswc 2018 (2)
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
 
Toward a Semantic Web of Vehicles
Toward a Semantic Web of VehiclesToward a Semantic Web of Vehicles
Toward a Semantic Web of Vehicles
 
Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
 
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
 

Kürzlich hochgeladen

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Kürzlich hochgeladen (11)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Things (IoT), Cyber-Physical-Systems (CPS)

  • 2. Trends on Data Graphs & Security for the Internet of Things Speaker: Dr. Ghislain Atemezing Research & Development Director, MONDECA, Paris, France Credits: Dr. Amelie Gyrard Kno.e.sis, Wright State University, Ohio, USA
  • 3. Agenda ● Motivation ● Background: Knowledge Graphs (KG), Semantic Web, Ontologies, etc. ● KGs for IoT ● Semantic Web approaches to security ○ Security Knowledge Graph with STAC (Security Toolbox: Attacks & Countermeasures) ○ Ontology catalog for IoT Security ○ Helping IoT developers secure their applications ○ STAC demo ○ STAC evaluation ● Ontology Quality with Perfecto applied for security ● Take away message
  • 5. Why do we Need to Secure IoT/CPS Applications? We can control people’s life otherwise!
  • 7. Classification of Cybersecurity from Europol ● Class of incident ● Type of incident for each class ● Description of the incident
  • 8. OWASP - Top 10 IoT Vulnerabilities ● I1 Weak Guessable, or Hardcoded Passwords ● I2 Insecure Network Services ● I3 Insecure Ecosystem Interfaces ● I4 Lack of Secure Update Mechanism ● I5 Use of Insecure or Outdated Components ● I6 Insufficient Privacy Protection ● I7 Insecure Data Transfer and Storage ● I8 Lack of Device Management ● I9 Insecure Default Settings ● I10 Lack of Physical Hardening https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf
  • 9. Access Control Models in IoT/WoT Environment (1) ● ACS authenticates the user and grants her the appropriate access token, allowing her to access the Thing’s resources for a certain period of time or permanently depending on the deployed policy, ● Better scalability and privacy in the system. ● Complicated to implement in constrained environment since the Things themselves needs to check the received access token De-centralized Architecture
  • 10. Access Control Models in IoT/ WoT Environment (2) ● User’s requests go through an access control server that authorizes and relays them to the right destination. ● This model is interesting in the WoT since all the complexity can be carried out by the server. ● Single point of failure, impersonation and privacy problems since all the requests and eventually responses are monitored by the server Centralized Architecture
  • 11. Quizz Slide Have you already heard about Knowledge Graph (KG)? What is a KG?
  • 12. “A graph of data with the intention to encode knowledge” “Link things that were never connected before using graph paradigm to transform business.” “Knowledge that is represented in machine readable format for data interoperability and discovery”
  • 13. Google’s Knowledge Graph (2012) Video (2 mins 44): https://youtu.be/mmQl6VGvX-c Blog: https://googleblog.blogspot.com/2012/05/introducing-knowledge-graph-things-not.html Directed labeled graph
  • 14. We are Using those Technologies Everyday Technologies used in the search engine back-end
  • 15. Quizz Slide Who already heard about:
  • 16. Knowledge Graphs for Internet of Things (IoT)
  • 17. Graph of Things - Le-Phuoc et al. Video (10 mins 33): https://www.youtube.com/watch?v=kNm6PlrBTi4 Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
  • 18. Graph of Things Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016] ● Temperature ● Wind ● Traffic Camera ● Airport ● Flight ● Ship ● Harbour ● Travel Camera ● Twitter ● Bike Station Water Level ● Metro Station
  • 19. Graph of Things Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016] Real-time -> temporal and spatial aspects Big Data Challenges: Big volume, fast real-time update and messy data sources
  • 20. IBM IoT KG Video: https://www.youtube.com/watch?v=ebBTdH62yLg
  • 21. Schema.org: Structured data on the Web by Google
  • 22. iot.schema.org - Ongoing Extension Ongoing Extension http://iotschema.org/
  • 23. iot.schema.org http://iotschema.org/Capability Extension for IoT domain. How to align with other existing ontologies?
  • 24. iot.schema.org - Ongoing Extension How to decide which concepts to include? http://iotschema.org/AirConditionerhttp://iotschema.org/Capability
  • 25. iot.schema.org - Ongoing Extension How to decide which concepts to include? http://iotschema.org/TemperatureSensinghttp://iotschema.org/Capability
  • 26. Modeling the Security Domain with Knowledge Graphs STAC (Security Toolbox: Attack & Countermeasure)
  • 27. ● Creating a Knowledge Graph for better interoperability and reuse ● Based on existing works in the field ● Collecting data from papers from 2005 to 2013 ● Initial version during Gyrard’s PhD thesis in 2013 The STAC Security Knowledge Graph
  • 28. STAC: The First Security Knowledge Graph Referenced by LOV
  • 29. STAC referenced on LOV April 2019
  • 30. STAC Ontology and Dataset STAC Ontology: http://securitytoolbox.appspot.com/stac# STAC Dataset: http://securitytoolbox.appspot.com/stac-dataset
  • 31. Technology Concept and Sub-Classes
  • 33. Obviously the ontology to describe the security domain must evolved! Security Mechanisms Sub-Classes
  • 34. Classification of Attacks and Security Mechanisms Specific to Sensor Networks According to the OSI Model
  • 35. Security Properties for Sensor Security Mechanisms
  • 36. Describing LLSP Security Mechanism in RDF/XML
  • 37. An ontology catalog for (IoT)-Security
  • 38. LOV4IoT: An ontology Catalog for IoT Demo: http://lov4iot.appspot.com/?p=ontologies 33 ontologies for security referenced
  • 40. A Potential Solution to Help Developers Secure IoT Applications
  • 41. Motivation for IoT Developers ● How to secure IoT architectures and applications? ○ Communications ○ Data ○ Technologies employed ○ Security properties satisfied ● Time-consuming to be familiar with: ○ Attacks ○ Security Mechanisms ● “Security by design” => Reuse the Machine-to-Machine Framework for another purpose: the security context => A tool to help choose the best security mechanism fitting our needs
  • 42. Assisting Developers in Securing IoT Apps with STAC
  • 43. S4AC / Fine-Grained Access Control Policies ● Lightweight vocabulary to create fine-grained access control policies for Linked Data. ● Share security information specifying the access control conditions under which the data is accessible. S4AC: http://ns.inria.fr/s4ac/v1/s4ac_v1.html
  • 44. Shi3ld: Context-Aware Authorization for Graph Stores ● Works on Named Graphs ● Step 0. The user defines the Access Policy ● Step 1. Query Contextualization ● Step 2. Access Policy Evaluation ● Step 3. Query Execution http://wimmics.inria.fr/projects/shi3ld/
  • 45. STAC Demo Online: Assisting Developers in Securing IoT Apps
  • 47. STAC Application (Video) STAC Demo: https://www.youtube.com/watch?v=vXYYbwM0xvY
  • 48. Demo: http://securitytoolbox.appspot.com/?p=stac Selecting a Technology Numerous technologies and security mechanisms to use in IoT
  • 49. Searching Attacks and Countermeasures for a Specific Technology Demo: http://securitytoolbox.appspot.com/?p=stac
  • 51. Security Properties Demo: http://securitytoolbox.appspot.com/?p=security_property All security mechanisms addressing the authentication security property
  • 53. Security for GSM/ 2G Demo: http://securitytoolbox.appspot.com/?p=cellular
  • 54. Security for GPRS/ 2.5G & UMTS/ 3G Demo: http://securitytoolbox.appspot.com/?p=cellular
  • 57. Example: An health application needs to be secured! STAC Application Template: Data Graph (Back-end)
  • 59. ● Methodologies: ○ Ontology Development 101: A guide to creating your first ontology [Noy et al. 2001] ● Semantic Web tools: ○ Oops, TripleChecker, RDF Validators, Vapour ○ Linked Open Vocabularies (LOV) ○ Linked Open Data (LOD) ● 24 security ontologies ○ More than 14 ontologies are online ● Evaluation user form: ○ 24 responses => STAC improved with new security domains Evaluation: STAC Ontology on LOV
  • 60. Evaluation: STAC dataset on DataHub https://old.datahub.io/dataset/stac
  • 63. STAC Evaluation STAC evaluation form: https://docs.google.com/forms/d/e/1FAIpQLScEoyupQi69NjNWygb1 I7lfJ6ClSQ6JrVY3YjeFo0h31j7K5g/viewform?usp=sf_link STAC evaluation results: https://docs.google.com/spreadsheets/d/1G21C2-uv47jeulGZnVdUq n0M2MR9gyejw8QpWsc4JHE/edit?usp=sharing
  • 65. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Selecting the security domain! Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
  • 66. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Selecting one specific ontology!
  • 67. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic integration with ontology quality tools
  • 68. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic ontology visualization
  • 70. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic ontology syntax validator
  • 71. Is your Security Ontology not Referenced yet on LOV4IoT? Writing your ontology URL here! Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 72. Evaluating your Security Ontology Automatic integration with ontology quality tools Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 73. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 74. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 75. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 77. ● We can’t stop the IoT/WoT revolution. ● Users are worried about their personal data that they will share with the smart objects and more importantly who can access them. ● Need to implement strong security mechanisms to protect their data inside and outside the infrastructure. ● Semantic technologies offer standards (ontologies, rules, RDF models) to leverage existing security issues in IoT for better interoperability mostly in identification, or to data control/access. Take Away Message!
  • 78. Challenges ● Semantic Web technologies to support both data producers and consumers in understanding, combining and interpreting policies in a meaningful and valuable way. ● Semantic Web technologies address issues such as appropriation, distortion, or challenges associated with invasion.
  • 79. Bibliography ● An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture. IEEE International Conference on Internet of Things 2014 (iThings), 2014 PDF, Paper via IEEE, Slides ● The STAC (Security Toolbox: Attacks & Countermeasures) ontology WWW 2013, 22nd International World Wide Web Conference, Poster, Brazil Paper, Poster ● Chapter 5 Security Toolbox: Attacks & Countermeasures (STAC) PhD: Designing Cross-Domain Semantic Web of Things Applications (2015) Thesis's defense, Eurecom, Sophia Antipolis, 24 April 2015 PhD thesis (has been selected as one of the 10 nominees for Best PhD Thesis Price - Telecom ParisTech 2015 - France) Slides, Demo
  • 80. Bibliography ● Semantic Web Methodologies, Best Practices and Ontology Engineering Applied to Internet of Things IEEE World Forum on Internet of Things (WF-IoT), 2015 PDF, Paper via IEEE, Slides ● A survey and analysis of ontology-based software tools for semantic interoperability in IoT and WoT landscapes. IEEE World Forum on Internet of Things (WF-IoT), 2018 PDF ● Privacy, Security and Policies: A review of Problems and Solutions with Semantic Web Technologies, SWJ (2018) ● Social Semantic Web Access Control. International Workshop Social Data on the Web (SDoW), 2011. ● An Access Control Model for Linked Data International IFIP Workshop on Semantic Web & Web Semantics (SWWS), 2011