Abstract
Failing or hostile elements are normal in the public Internet of Things (IoT). Resilient IoT systems are engineered to fail safely and recover gracefully in the face of challenges presented by their environment. Approaches to ensuring resilient behaviour include intrusion detection, redundancy and self-healing. Adaptive, anomaly-based defence mechanisms are particularly well-suited to systems that are deployed in the public internet. This paper discusses the use of SDL+ (SDL with MSC and ASN.1) to generate simulation results for training anomaly-based defence mechanisms for smart systems. It outlines an approach based on the SDL+ methodology to create resilient IoT systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
References
Sherratt, E., Ober, I., Gaudin, E., Fonseca i Casas, P., Kristoffersen, F.: SDL - the IoT language. In: Fischer, J., Scheidgen, M., Schieferdecker, I., Reed, R. (eds.) SDL 2015. LNCS, vol. 9369, pp. 27–41. Springer, Cham (2015). doi:10.1007/978-3-319-24912-4_3
Scully, P.M.D.: CARDINAL- Vanilla: immune system inspired prioritisation and distribution of security information for industrial networks, Aberystwyth University, Ph.D. thesis (2014). http://cadair.aber.ac.uk/dspace/handle/2160/43304
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 58 (2009). Article 15. ACM. http://doi.acm.org/10.1145/1541880.1541882
GarcÃa-Teodoro, P., DÃaz-Verdejo, J., Maciá-Fernándeza, G., Vázquez, E.: Add to E-shelf anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). Elsevier
Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016). Elsevier. http://dx.doi.org/10.1016/j.jnca.2015.11.016
ITU-T: Z.100 series Recommendations for SDL 2010, International Telecommunications Union 2011–2016. ITU-T (2011–2016). https://www.itu.int/rec/T-REC-Z/en
ITU-T: Z-series Recommendations Supplement 1, International Telecommunications Union 2015 (2015). https://www.itu.int/rec/T-REC-Z.Sup1/en
Song, J., Zhu, Z., Scully, P., Price, C.: Selecting features for anomaly intrusion detection: a novel method using fuzzy C means and decision tree classification. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 299–307. Springer, Cham (2013). doi:10.1007/978-3-319-03584-0_22
Blanchard, T.: Endocrine inspired control of wireless sensor networks: deployment and analysis. Aberystwyth University, Ph.D. thesis (2016)
Alolayan, B.: Toward sustainable households: passive context-aware intervention to promote reduction in food waste. Aberystwyth University, Ph.D. thesis (2016)
Williams, A.W., Probert, R.L., Li, Q., Kim, T.-H.: The winning entry of the SAM 2002 design contest. In: Reed, R., Reed, J. (eds.) SDL 2003. LNCS, vol. 2708, pp. 387–403. Springer, Heidelberg (2003). doi:10.1007/3-540-45075-0_23
ITU-T: Recommendation ITU-T Z.151, User Requirements Notation (URN) Language definition ITU-T (2012). https://www.itu.int/rec/T-REC-Z.150-201102-I/en
TTCN-3 standards, ETSI - European Telecommunications Standards Institute. http://www.ttcn-3.org/index.php/downloads/standards
ITU-T: Recommendation ITU-T Z.120, Message Sequence Chart (MSC). ITU-T (2011). https://www.itu.int/rec/T-REC-Z.120-201102-I/en
Sargent, R.G.: Verification and Validation of Simulation Models. In: Henderson, S.G., Biller, B., Hsieh, M.-H., Shortle, J., Tew, J.D., Barton, R.R. (eds.) Proceedings of WSC 2007, Winter Simulation Conference (2007). http://www.informs-sim.org/wsc07papers/014.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Sherratt, E. (2017). Intelligent Resilience in the IoT. In: Csöndes, T., Kovács, G., Réthy, G. (eds) SDL 2017: Model-Driven Engineering for Future Internet. SDL 2017. Lecture Notes in Computer Science(), vol 10567. Springer, Cham. https://doi.org/10.1007/978-3-319-68015-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-68015-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68014-9
Online ISBN: 978-3-319-68015-6
eBook Packages: Computer ScienceComputer Science (R0)