A model-driven adaptive approach for IoT security

Bruno A. Mozzaquatro, Carlos Agostinho, Raquel Melo, Ricardo Jardim-Goncalves

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)


Internet of Things (IoT) and sensor networks are improving the cooperation between organizations, becoming more efficient and productive for the industrial systems. However, high iteration between human, machines, and heterogeneous IoT technologies increases the security threats. The IoT security is an essential requirement to fully adoption of applications, which requires correct management of information and confidentiality. The system and devices’ variability requires dynamically adaptive systems to provide services depending on the context of the environment. In this paper, we propose a model driven adaptive approach to offer security services for an ontology-based security framework. Model-Driven Engineering (MDE) approach allows creating secure capabilities more efficient with the generation of security services based on security requirements in the knowledge base (IoTSec ontology). An industrial scenario of C2NET project was analyzed to identify the transformation of a system design of security solution in a platform specific model.

Original languageEnglish
Title of host publicationModel-Driven Engineering and Software Development - 4th International Conference, MODELSWARD 2016, Revised Selected Papers
PublisherSpringer Verlag
Number of pages21
ISBN (Print)9783319663012
Publication statusPublished - 1 Jan 2017
Event4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016 - Rome, Italy
Duration: 19 Feb 201621 Feb 2016

Publication series

NameCommunications in Computer and Information Science
ISSN (Print)1865-0929


Conference4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016


  • Adaptive approach
  • Internet of things
  • Model-driven engineering
  • Ontology
  • Security management


Dive into the research topics of 'A model-driven adaptive approach for IoT security'. Together they form a unique fingerprint.

Cite this