Skip to main content

Intelligent Resilience in the IoT

  • Conference paper
  • First Online:
SDL 2017: Model-Driven Engineering for Future Internet (SDL 2017)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10567))

Included in the following conference series:

Abstract

Failing or hostile elements are normal in the public Internet of Things (IoT). Resilient IoT systems are engineered to fail safely and recover gracefully in the face of challenges presented by their environment. Approaches to ensuring resilient behaviour include intrusion detection, redundancy and self-healing. Adaptive, anomaly-based defence mechanisms are particularly well-suited to systems that are deployed in the public internet. This paper discusses the use of SDL+ (SDL with MSC and ASN.1) to generate simulation results for training anomaly-based defence mechanisms for smart systems. It outlines an approach based on the SDL+ methodology to create resilient IoT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    PragmaDev Studio.

  2. 2.

    Cinderella.

  3. 3.

    IBM Rational Tau.

  4. 4.

    https://www.ll.mit.edu/ideval/data/.

  5. 5.

    https://www.quora.com/Where-can-I-get-the-latest-dataset-for-a-network-intrusion-detection-system.

  6. 6.

    http://www.sdl-forum.org/SAM_contest/Li_Probert_Williams/Railway_doc.pdf.

  7. 7.

    https://www.itu.int/en/ITU-T/asn1/Pages/introduction.aspx.

  8. 8.

    http://pragmadev.com/product/index.html.

  9. 9.

    http://www.cinderella.dk/.

References

  1. Sherratt, E., Ober, I., Gaudin, E., Fonseca i Casas, P., Kristoffersen, F.: SDL - the IoT language. In: Fischer, J., Scheidgen, M., Schieferdecker, I., Reed, R. (eds.) SDL 2015. LNCS, vol. 9369, pp. 27–41. Springer, Cham (2015). doi:10.1007/978-3-319-24912-4_3

    Chapter  Google Scholar 

  2. Scully, P.M.D.: CARDINAL- Vanilla: immune system inspired prioritisation and distribution of security information for industrial networks, Aberystwyth University, Ph.D. thesis (2014). http://cadair.aber.ac.uk/dspace/handle/2160/43304

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 58 (2009). Article 15. ACM. http://doi.acm.org/10.1145/1541880.1541882

    Article  Google Scholar 

  4. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernándeza, G., Vázquez, E.: Add to E-shelf anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). Elsevier

    Article  Google Scholar 

  5. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016). Elsevier. http://dx.doi.org/10.1016/j.jnca.2015.11.016

    Article  Google Scholar 

  6. ITU-T: Z.100 series Recommendations for SDL 2010, International Telecommunications Union 2011–2016. ITU-T (2011–2016). https://www.itu.int/rec/T-REC-Z/en

  7. ITU-T: Z-series Recommendations Supplement 1, International Telecommunications Union 2015 (2015). https://www.itu.int/rec/T-REC-Z.Sup1/en

  8. Song, J., Zhu, Z., Scully, P., Price, C.: Selecting features for anomaly intrusion detection: a novel method using fuzzy C means and decision tree classification. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 299–307. Springer, Cham (2013). doi:10.1007/978-3-319-03584-0_22

    Chapter  Google Scholar 

  9. Blanchard, T.: Endocrine inspired control of wireless sensor networks: deployment and analysis. Aberystwyth University, Ph.D. thesis (2016)

    Google Scholar 

  10. Alolayan, B.: Toward sustainable households: passive context-aware intervention to promote reduction in food waste. Aberystwyth University, Ph.D. thesis (2016)

    Google Scholar 

  11. Williams, A.W., Probert, R.L., Li, Q., Kim, T.-H.: The winning entry of the SAM 2002 design contest. In: Reed, R., Reed, J. (eds.) SDL 2003. LNCS, vol. 2708, pp. 387–403. Springer, Heidelberg (2003). doi:10.1007/3-540-45075-0_23

    Chapter  Google Scholar 

  12. ITU-T: Recommendation ITU-T Z.151, User Requirements Notation (URN) Language definition ITU-T (2012). https://www.itu.int/rec/T-REC-Z.150-201102-I/en

  13. TTCN-3 standards, ETSI - European Telecommunications Standards Institute. http://www.ttcn-3.org/index.php/downloads/standards

  14. ITU-T: Recommendation ITU-T Z.120, Message Sequence Chart (MSC). ITU-T (2011). https://www.itu.int/rec/T-REC-Z.120-201102-I/en

  15. Sargent, R.G.: Verification and Validation of Simulation Models. In: Henderson, S.G., Biller, B., Hsieh, M.-H., Shortle, J., Tew, J.D., Barton, R.R. (eds.) Proceedings of WSC 2007, Winter Simulation Conference (2007). http://www.informs-sim.org/wsc07papers/014.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edel Sherratt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Sherratt, E. (2017). Intelligent Resilience in the IoT. In: Csöndes, T., Kovács, G., Réthy, G. (eds) SDL 2017: Model-Driven Engineering for Future Internet. SDL 2017. Lecture Notes in Computer Science(), vol 10567. Springer, Cham. https://doi.org/10.1007/978-3-319-68015-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68015-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68014-9

  • Online ISBN: 978-3-319-68015-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics