SlideShare a Scribd company logo
Web site: https://sites.google.com/view/iot-cps-2019/program?authuser=0
Trends on Data Graphs & Security
for the Internet of Things
Speaker:
Dr. Ghislain Atemezing
Research & Development Director, MONDECA, Paris, France
Credits:
Dr. Amelie Gyrard
Kno.e.sis, Wright State University, Ohio, USA
Agenda
● Motivation
● Background: Knowledge Graphs (KG), Semantic Web, Ontologies, etc.
● KGs for IoT
● Semantic Web approaches to security
○ Security Knowledge Graph with
STAC (Security Toolbox: Attacks & Countermeasures)
○ Ontology catalog for IoT Security
○ Helping IoT developers secure their applications
○ STAC demo
○ STAC evaluation
● Ontology Quality with Perfecto applied for security
● Take away message
Motivation
Why do we Need to Secure IoT/CPS Applications?
We can control
people’s life otherwise!
https://www.ahajournals.org/doi/full/10.1161/CIRCULATIONAHA.118.037331
Why do we Need to Secure IoT/CPS Applications?
Classification of Cybersecurity from Europol
● Class of incident
● Type of incident for
each class
● Description of the
incident
OWASP - Top 10 IoT Vulnerabilities
● I1 Weak Guessable, or Hardcoded Passwords
● I2 Insecure Network Services
● I3 Insecure Ecosystem Interfaces
● I4 Lack of Secure Update Mechanism
● I5 Use of Insecure or Outdated Components
● I6 Insufficient Privacy Protection
● I7 Insecure Data Transfer and Storage
● I8 Lack of Device Management
● I9 Insecure Default Settings
● I10 Lack of Physical Hardening
https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf
Access Control Models in IoT/WoT Environment (1)
● ACS authenticates the user and
grants her the appropriate access
token, allowing her to access the
Thing’s resources for a certain period
of time or permanently depending on
the deployed policy,
● Better scalability and privacy in the
system.
● Complicated to implement in
constrained environment since the
Things themselves needs to check the
received access token
De-centralized Architecture
Access Control Models in IoT/ WoT Environment (2)
● User’s requests go through an access
control server that authorizes and
relays them to the right destination.
● This model is interesting in the WoT
since all the complexity can be carried
out by the server.
● Single point of failure, impersonation
and privacy problems since all the
requests and eventually responses
are monitored by the server
Centralized Architecture
Quizz Slide
Have you already heard about
Knowledge Graph (KG)?
What is a KG?
“A graph of data with the intention
to encode knowledge”
“Link things that were never connected before using
graph paradigm to transform business.”
“Knowledge that is represented in machine
readable format for data interoperability and
discovery”
Google’s Knowledge Graph (2012)
Video (2 mins 44): https://youtu.be/mmQl6VGvX-c
Blog: https://googleblog.blogspot.com/2012/05/introducing-knowledge-graph-things-not.html
Directed labeled graph
We are Using those Technologies Everyday
Technologies used in the
search engine back-end
Quizz Slide
Who already heard about:
Knowledge Graphs for
Internet of Things (IoT)
Graph of Things - Le-Phuoc et al.
Video (10 mins 33): https://www.youtube.com/watch?v=kNm6PlrBTi4
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
Graph of Things
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
● Temperature
● Wind
● Traffic Camera
● Airport
● Flight
● Ship
● Harbour
● Travel Camera
● Twitter
● Bike Station
Water Level
● Metro Station
Graph of Things
Demo: http://graphofthings.org/
Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
Real-time -> temporal
and spatial aspects
Big Data Challenges:
Big volume, fast
real-time update and
messy data sources
IBM IoT KG
Video: https://www.youtube.com/watch?v=ebBTdH62yLg
Schema.org: Structured data on the Web by Google
iot.schema.org - Ongoing Extension
Ongoing
Extension
http://iotschema.org/
iot.schema.org
http://iotschema.org/Capability
Extension for IoT
domain. How to align
with other existing
ontologies?
iot.schema.org - Ongoing Extension
How to decide
which concepts to
include?
http://iotschema.org/AirConditionerhttp://iotschema.org/Capability
iot.schema.org - Ongoing Extension
How to decide
which concepts to
include?
http://iotschema.org/TemperatureSensinghttp://iotschema.org/Capability
Modeling the Security Domain
with Knowledge Graphs
STAC
(Security Toolbox:
Attack & Countermeasure)
● Creating a Knowledge Graph for
better interoperability and reuse
● Based on existing works in the
field
● Collecting data from papers from
2005 to 2013
● Initial version during Gyrard’s
PhD thesis in 2013
The STAC Security Knowledge Graph
STAC: The First Security Knowledge Graph
Referenced by LOV
STAC referenced on LOV
April 2019
STAC Ontology and Dataset
STAC Ontology: http://securitytoolbox.appspot.com/stac#
STAC Dataset: http://securitytoolbox.appspot.com/stac-dataset
Technology Concept and Sub-Classes
Web Attacks Sub-Classes and Axioms
Obviously the ontology
to describe the security
domain must evolved!
Security Mechanisms Sub-Classes
Classification of Attacks and Security Mechanisms
Specific to Sensor Networks
According to the OSI Model
Security Properties for
Sensor Security Mechanisms
Describing LLSP Security Mechanism in RDF/XML
An ontology catalog for
(IoT)-Security
LOV4IoT: An ontology Catalog for IoT
Demo: http://lov4iot.appspot.com/?p=ontologies
33 ontologies for
security referenced
LOV4IoT-Security
Demo: http://lov4iot.appspot.com/?p=lov4iot-security
A Potential Solution to Help
Developers
Secure IoT Applications
Motivation for IoT Developers
● How to secure IoT architectures and applications?
○ Communications
○ Data
○ Technologies employed
○ Security properties satisfied
● Time-consuming to be familiar with:
○ Attacks
○ Security Mechanisms
● “Security by design”
=> Reuse the Machine-to-Machine Framework for another purpose: the security
context
=> A tool to help choose the best security mechanism fitting our needs
Assisting Developers
in Securing IoT Apps with STAC
S4AC / Fine-Grained Access Control Policies
● Lightweight vocabulary to create fine-grained access control policies for
Linked Data.
● Share security information specifying the access control conditions under
which the data is accessible.
S4AC: http://ns.inria.fr/s4ac/v1/s4ac_v1.html
Shi3ld: Context-Aware Authorization for Graph Stores
● Works on Named Graphs
● Step 0. The user defines the
Access Policy
● Step 1. Query Contextualization
● Step 2. Access Policy
Evaluation
● Step 3. Query Execution
http://wimmics.inria.fr/projects/shi3ld/
STAC Demo Online: Assisting
Developers in Securing IoT Apps
Demo: http://securitytoolbox.appspot.com/
STAC Application
STAC Application (Video)
STAC Demo: https://www.youtube.com/watch?v=vXYYbwM0xvY
Demo: http://securitytoolbox.appspot.com/?p=stac
Selecting a Technology
Numerous
technologies and
security
mechanisms to use
in IoT
Searching Attacks and Countermeasures
for a Specific Technology
Demo: http://securitytoolbox.appspot.com/?p=stac
Cryptography
Demo: http://securitytoolbox.appspot.com/?p=cryptography
Tooltip to
provide more
explanations
Security Properties
Demo: http://securitytoolbox.appspot.com/?p=security_property
All security mechanisms
addressing the
authentication security
property
Security Properties
Demo: http://securitytoolbox.appspot.com/?p=security_property
Security for GSM/ 2G
Demo: http://securitytoolbox.appspot.com/?p=cellular
Security for GPRS/ 2.5G & UMTS/ 3G
Demo: http://securitytoolbox.appspot.com/?p=cellular
Demo: http://securitytoolbox.appspot.com/?p=attack
Attacks & Countermeasures
STAC Application Template: GUI
Example: An health application needs to be secured!
STAC Application Template:
Data Graph (Back-end)
STAC Evaluation
● Methodologies:
○ Ontology Development 101: A guide to creating your
first ontology [Noy et al. 2001]
● Semantic Web tools:
○ Oops, TripleChecker, RDF Validators, Vapour
○ Linked Open Vocabularies (LOV)
○ Linked Open Data (LOD)
● 24 security ontologies
○ More than 14 ontologies are online
● Evaluation user form:
○ 24 responses
=> STAC improved with new security domains
Evaluation: STAC Ontology on LOV
Evaluation: STAC dataset on DataHub
https://old.datahub.io/dataset/stac
STAC Evaluation
STAC Evaluation
STAC Evaluation
STAC evaluation form:
https://docs.google.com/forms/d/e/1FAIpQLScEoyupQi69NjNWygb1
I7lfJ6ClSQ6JrVY3YjeFo0h31j7K5g/viewform?usp=sf_link
STAC evaluation results:
https://docs.google.com/spreadsheets/d/1G21C2-uv47jeulGZnVdUq
n0M2MR9gyejw8QpWsc4JHE/edit?usp=sharing
Ontology/
Knowledge Graph Quality
with PerfectO
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Selecting the
security domain!
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Selecting one specific
ontology!
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic integration with
ontology quality tools
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic ontology
visualization
Automatic Integration with
Ontology Visualization
Security Ontology Quality
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
Automatic ontology
syntax validator
Is your Security Ontology
not Referenced yet on LOV4IoT?
Writing your ontology
URL here!
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Evaluating your Security Ontology
Automatic integration with
ontology quality tools
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Improving your Security Ontology
Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
Take Away Message
● We can’t stop the IoT/WoT revolution.
● Users are worried about their personal data that they will share
with the smart objects and more importantly who can access
them.
● Need to implement strong security mechanisms to protect their
data inside and outside the infrastructure.
● Semantic technologies offer standards (ontologies, rules, RDF
models) to leverage existing security issues in IoT for better
interoperability mostly in identification, or to data
control/access.
Take Away Message!
Challenges
● Semantic Web technologies to support both data
producers and consumers in understanding, combining
and interpreting policies in a meaningful and valuable
way.
● Semantic Web technologies address issues such as
appropriation, distortion, or challenges associated with
invasion.
Bibliography
● An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture.
IEEE International Conference on Internet of Things 2014 (iThings), 2014
PDF, Paper via IEEE, Slides
● The STAC (Security Toolbox: Attacks & Countermeasures) ontology
WWW 2013, 22nd International World Wide Web Conference, Poster, Brazil
Paper, Poster
● Chapter 5 Security Toolbox: Attacks & Countermeasures (STAC)
PhD: Designing Cross-Domain Semantic Web of Things Applications (2015)
Thesis's defense, Eurecom, Sophia Antipolis, 24 April 2015
PhD thesis (has been selected as one of the 10 nominees for Best PhD Thesis Price - Telecom
ParisTech 2015 - France)
Slides, Demo
Bibliography
● Semantic Web Methodologies, Best Practices and Ontology Engineering Applied to Internet of
Things
IEEE World Forum on Internet of Things (WF-IoT), 2015
PDF, Paper via IEEE, Slides
● A survey and analysis of ontology-based software tools for semantic interoperability in IoT and
WoT landscapes.
IEEE World Forum on Internet of Things (WF-IoT), 2018
PDF
● Privacy, Security and Policies: A review of Problems and Solutions with Semantic Web
Technologies,
SWJ (2018)
● Social Semantic Web Access Control.
International Workshop Social Data on the Web (SDoW), 2011.
● An Access Control Model for Linked Data
International IFIP Workshop on Semantic Web & Web Semantics (SWWS), 2011

More Related Content

PDF
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
PPTX
Concept extraction from the web of things (3)
PDF
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
PDF
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
PDF
FiCloud2016 lov4iot extended
PDF
FiCloud2016 lov4iot second life ontology
PPTX
Towards Automating Data Narratives
PPTX
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...
Defining iot.schema.org: Using Knowledge Extraction from Existing IoT-based ...
Concept extraction from the web of things (3)
Internet of Robotic Things Ontology catalog, knowledge extraction IEEE P1872....
Knowledge Extraction for the Web of Things (KE4WoT) Challenge: Co-located wit...
FiCloud2016 lov4iot extended
FiCloud2016 lov4iot second life ontology
Towards Automating Data Narratives
OKG-Soft: An Open Knowledge Graph With Mathine Readable Scientific Software M...

What's hot (16)

PDF
Some "challenges" on the open-source/open-data front
PDF
Km4City Smart City API: an integrated support for mobility services
PDF
Smart Cloud Engine and Solution based on Knowledge Base
PDF
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
PDF
第1回バイオインフォマティクスデータ可視化セミナー@Riken
PDF
Developing Smart Cities Services through Semantic Analysis of Social Streams
PDF
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
PDF
Automatic Selection of Linked Open Data features in Graph-based Recommender S...
PDF
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
PDF
Decentralized AI Draper
PDF
Future is private intel dev fest
PDF
DFlow is dead. Long live Tako!
PDF
Data extraction tools
PDF
EclipseCon France 2015 - Science Track
PDF
Jinank Jain
PDF
The Italian Hate Map: semantic content analytics for social good
Some "challenges" on the open-source/open-data front
Km4City Smart City API: an integrated support for mobility services
Smart Cloud Engine and Solution based on Knowledge Base
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
第1回バイオインフォマティクスデータ可視化セミナー@Riken
Developing Smart Cities Services through Semantic Analysis of Social Streams
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Automatic Selection of Linked Open Data features in Graph-based Recommender S...
DeCAT 2015 - International Workshop on Deep Content Analytics Techniques for ...
Decentralized AI Draper
Future is private intel dev fest
DFlow is dead. Long live Tako!
Data extraction tools
EclipseCon France 2015 - Science Track
Jinank Jain
The Italian Hate Map: semantic content analytics for social good
Ad

Similar to Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Things (IoT), Cyber-Physical-Systems (CPS) (20)

PPTX
Trends on Data Graphs & Security for the Internet of Things
PPTX
Product security by Blockchain, AI and Security Certs
PDF
Certified Internet of Things Specialist ( CIoTS )
PDF
Advance security in cloud computing for military weapons
PDF
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
PPTX
N01 cloud computing_and_gae
PDF
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
PDF
internet-of-things-5.........................pdf
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PDF
Making a Better World with Technology Innovations
PPTX
Microservices: The Future-Proof Framework for IoT
PDF
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
19507334023_NURISMA Z.D._PPT P PRADANA.pptx
PDF
Agile Secure Development
PPTX
Security and Trust in an Industrial Grid Project
PDF
Augmate connect_Deck
PDF
Industry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
PDF
Object Detection Bot
Trends on Data Graphs & Security for the Internet of Things
Product security by Blockchain, AI and Security Certs
Certified Internet of Things Specialist ( CIoTS )
Advance security in cloud computing for military weapons
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
N01 cloud computing_and_gae
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
internet-of-things-5.........................pdf
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Making a Better World with Technology Innovations
Microservices: The Future-Proof Framework for IoT
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
19507334023_NURISMA Z.D._PPT P PRADANA.pptx
Agile Secure Development
Security and Trust in an Industrial Grid Project
Augmate connect_Deck
Industry4.0 IoT Vincent Thavonekham - Azure Day Ukraine
Object Detection Bot
Ad

More from Amélie Gyrard (11)

PDF
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
PDF
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
PDF
Toward a Semantic Web of Vehicles
PDF
Presentation aina2016 seg3.0_methodology_v2
PDF
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
PDF
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
PDF
Fi cloudpresentationgyrardaugust2015 v2
PDF
Designing Cross-Domain Semantic Web of Things Applications
PDF
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
PDF
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
PDF
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...
Slides chase 2019 connected health conference - thursday 26 september 2019 -...
Personalized health knowledge graph ckg workshop - iswc 2018 (2)
Toward a Semantic Web of Vehicles
Presentation aina2016 seg3.0_methodology_v2
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
Fi cloudpresentationgyrardaugust2015 v2
Designing Cross-Domain Semantic Web of Things Applications
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
An Ontology to Semantically Annotate the Machine-to-Machine (M2M) Device Meas...

Recently uploaded (20)

PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Introduction to Information and Communication Technology
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificial intelligence overview of it and more
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPT
tcp ip networks nd ip layering assotred slides
522797556-Unit-2-Temperature-measurement-1-1.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Introduction to Information and Communication Technology
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Paper PDF World Game (s) Great Redesign.pdf
artificial intelligence overview of it and more
The Internet -By the Numbers, Sri Lanka Edition
introduction about ICD -10 & ICD-11 ppt.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
international classification of diseases ICD-10 review PPT.pptx
Sims 4 Historia para lo sims 4 para jugar
Decoding a Decade: 10 Years of Applied CTI Discipline
SAP Ariba Sourcing PPT for learning material
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
tcp ip networks nd ip layering assotred slides

Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Things (IoT), Cyber-Physical-Systems (CPS)

  • 2. Trends on Data Graphs & Security for the Internet of Things Speaker: Dr. Ghislain Atemezing Research & Development Director, MONDECA, Paris, France Credits: Dr. Amelie Gyrard Kno.e.sis, Wright State University, Ohio, USA
  • 3. Agenda ● Motivation ● Background: Knowledge Graphs (KG), Semantic Web, Ontologies, etc. ● KGs for IoT ● Semantic Web approaches to security ○ Security Knowledge Graph with STAC (Security Toolbox: Attacks & Countermeasures) ○ Ontology catalog for IoT Security ○ Helping IoT developers secure their applications ○ STAC demo ○ STAC evaluation ● Ontology Quality with Perfecto applied for security ● Take away message
  • 5. Why do we Need to Secure IoT/CPS Applications? We can control people’s life otherwise!
  • 7. Classification of Cybersecurity from Europol ● Class of incident ● Type of incident for each class ● Description of the incident
  • 8. OWASP - Top 10 IoT Vulnerabilities ● I1 Weak Guessable, or Hardcoded Passwords ● I2 Insecure Network Services ● I3 Insecure Ecosystem Interfaces ● I4 Lack of Secure Update Mechanism ● I5 Use of Insecure or Outdated Components ● I6 Insufficient Privacy Protection ● I7 Insecure Data Transfer and Storage ● I8 Lack of Device Management ● I9 Insecure Default Settings ● I10 Lack of Physical Hardening https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf
  • 9. Access Control Models in IoT/WoT Environment (1) ● ACS authenticates the user and grants her the appropriate access token, allowing her to access the Thing’s resources for a certain period of time or permanently depending on the deployed policy, ● Better scalability and privacy in the system. ● Complicated to implement in constrained environment since the Things themselves needs to check the received access token De-centralized Architecture
  • 10. Access Control Models in IoT/ WoT Environment (2) ● User’s requests go through an access control server that authorizes and relays them to the right destination. ● This model is interesting in the WoT since all the complexity can be carried out by the server. ● Single point of failure, impersonation and privacy problems since all the requests and eventually responses are monitored by the server Centralized Architecture
  • 11. Quizz Slide Have you already heard about Knowledge Graph (KG)? What is a KG?
  • 12. “A graph of data with the intention to encode knowledge” “Link things that were never connected before using graph paradigm to transform business.” “Knowledge that is represented in machine readable format for data interoperability and discovery”
  • 13. Google’s Knowledge Graph (2012) Video (2 mins 44): https://youtu.be/mmQl6VGvX-c Blog: https://googleblog.blogspot.com/2012/05/introducing-knowledge-graph-things-not.html Directed labeled graph
  • 14. We are Using those Technologies Everyday Technologies used in the search engine back-end
  • 15. Quizz Slide Who already heard about:
  • 16. Knowledge Graphs for Internet of Things (IoT)
  • 17. Graph of Things - Le-Phuoc et al. Video (10 mins 33): https://www.youtube.com/watch?v=kNm6PlrBTi4 Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016]
  • 18. Graph of Things Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016] ● Temperature ● Wind ● Traffic Camera ● Airport ● Flight ● Ship ● Harbour ● Travel Camera ● Twitter ● Bike Station Water Level ● Metro Station
  • 19. Graph of Things Demo: http://graphofthings.org/ Paper: The Graph of Things: A step towards the Live Knowledge Graph of connected things [Le-Phuoc et al. 2016] Real-time -> temporal and spatial aspects Big Data Challenges: Big volume, fast real-time update and messy data sources
  • 20. IBM IoT KG Video: https://www.youtube.com/watch?v=ebBTdH62yLg
  • 21. Schema.org: Structured data on the Web by Google
  • 22. iot.schema.org - Ongoing Extension Ongoing Extension http://iotschema.org/
  • 24. iot.schema.org - Ongoing Extension How to decide which concepts to include? http://iotschema.org/AirConditionerhttp://iotschema.org/Capability
  • 25. iot.schema.org - Ongoing Extension How to decide which concepts to include? http://iotschema.org/TemperatureSensinghttp://iotschema.org/Capability
  • 26. Modeling the Security Domain with Knowledge Graphs STAC (Security Toolbox: Attack & Countermeasure)
  • 27. ● Creating a Knowledge Graph for better interoperability and reuse ● Based on existing works in the field ● Collecting data from papers from 2005 to 2013 ● Initial version during Gyrard’s PhD thesis in 2013 The STAC Security Knowledge Graph
  • 28. STAC: The First Security Knowledge Graph Referenced by LOV
  • 29. STAC referenced on LOV April 2019
  • 30. STAC Ontology and Dataset STAC Ontology: http://securitytoolbox.appspot.com/stac# STAC Dataset: http://securitytoolbox.appspot.com/stac-dataset
  • 31. Technology Concept and Sub-Classes
  • 33. Obviously the ontology to describe the security domain must evolved! Security Mechanisms Sub-Classes
  • 34. Classification of Attacks and Security Mechanisms Specific to Sensor Networks According to the OSI Model
  • 35. Security Properties for Sensor Security Mechanisms
  • 36. Describing LLSP Security Mechanism in RDF/XML
  • 37. An ontology catalog for (IoT)-Security
  • 38. LOV4IoT: An ontology Catalog for IoT Demo: http://lov4iot.appspot.com/?p=ontologies 33 ontologies for security referenced
  • 40. A Potential Solution to Help Developers Secure IoT Applications
  • 41. Motivation for IoT Developers ● How to secure IoT architectures and applications? ○ Communications ○ Data ○ Technologies employed ○ Security properties satisfied ● Time-consuming to be familiar with: ○ Attacks ○ Security Mechanisms ● “Security by design” => Reuse the Machine-to-Machine Framework for another purpose: the security context => A tool to help choose the best security mechanism fitting our needs
  • 42. Assisting Developers in Securing IoT Apps with STAC
  • 43. S4AC / Fine-Grained Access Control Policies ● Lightweight vocabulary to create fine-grained access control policies for Linked Data. ● Share security information specifying the access control conditions under which the data is accessible. S4AC: http://ns.inria.fr/s4ac/v1/s4ac_v1.html
  • 44. Shi3ld: Context-Aware Authorization for Graph Stores ● Works on Named Graphs ● Step 0. The user defines the Access Policy ● Step 1. Query Contextualization ● Step 2. Access Policy Evaluation ● Step 3. Query Execution http://wimmics.inria.fr/projects/shi3ld/
  • 45. STAC Demo Online: Assisting Developers in Securing IoT Apps
  • 47. STAC Application (Video) STAC Demo: https://www.youtube.com/watch?v=vXYYbwM0xvY
  • 48. Demo: http://securitytoolbox.appspot.com/?p=stac Selecting a Technology Numerous technologies and security mechanisms to use in IoT
  • 49. Searching Attacks and Countermeasures for a Specific Technology Demo: http://securitytoolbox.appspot.com/?p=stac
  • 51. Security Properties Demo: http://securitytoolbox.appspot.com/?p=security_property All security mechanisms addressing the authentication security property
  • 53. Security for GSM/ 2G Demo: http://securitytoolbox.appspot.com/?p=cellular
  • 54. Security for GPRS/ 2.5G & UMTS/ 3G Demo: http://securitytoolbox.appspot.com/?p=cellular
  • 57. Example: An health application needs to be secured! STAC Application Template: Data Graph (Back-end)
  • 59. ● Methodologies: ○ Ontology Development 101: A guide to creating your first ontology [Noy et al. 2001] ● Semantic Web tools: ○ Oops, TripleChecker, RDF Validators, Vapour ○ Linked Open Vocabularies (LOV) ○ Linked Open Data (LOD) ● 24 security ontologies ○ More than 14 ontologies are online ● Evaluation user form: ○ 24 responses => STAC improved with new security domains Evaluation: STAC Ontology on LOV
  • 60. Evaluation: STAC dataset on DataHub https://old.datahub.io/dataset/stac
  • 63. STAC Evaluation STAC evaluation form: https://docs.google.com/forms/d/e/1FAIpQLScEoyupQi69NjNWygb1 I7lfJ6ClSQ6JrVY3YjeFo0h31j7K5g/viewform?usp=sf_link STAC evaluation results: https://docs.google.com/spreadsheets/d/1G21C2-uv47jeulGZnVdUq n0M2MR9gyejw8QpWsc4JHE/edit?usp=sharing
  • 65. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Selecting the security domain! Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT
  • 66. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Selecting one specific ontology!
  • 67. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic integration with ontology quality tools
  • 68. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic ontology visualization
  • 70. Security Ontology Quality Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidationLOV4IoT Automatic ontology syntax validator
  • 71. Is your Security Ontology not Referenced yet on LOV4IoT? Writing your ontology URL here! Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 72. Evaluating your Security Ontology Automatic integration with ontology quality tools Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 73. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 74. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 75. Improving your Security Ontology Demo: http://perfectsemanticweb.appspot.com/?p=ontologyValidation
  • 77. ● We can’t stop the IoT/WoT revolution. ● Users are worried about their personal data that they will share with the smart objects and more importantly who can access them. ● Need to implement strong security mechanisms to protect their data inside and outside the infrastructure. ● Semantic technologies offer standards (ontologies, rules, RDF models) to leverage existing security issues in IoT for better interoperability mostly in identification, or to data control/access. Take Away Message!
  • 78. Challenges ● Semantic Web technologies to support both data producers and consumers in understanding, combining and interpreting policies in a meaningful and valuable way. ● Semantic Web technologies address issues such as appropriation, distortion, or challenges associated with invasion.
  • 79. Bibliography ● An ontology-based approach for helping to secure the ETSI Machine-to-Machine Architecture. IEEE International Conference on Internet of Things 2014 (iThings), 2014 PDF, Paper via IEEE, Slides ● The STAC (Security Toolbox: Attacks & Countermeasures) ontology WWW 2013, 22nd International World Wide Web Conference, Poster, Brazil Paper, Poster ● Chapter 5 Security Toolbox: Attacks & Countermeasures (STAC) PhD: Designing Cross-Domain Semantic Web of Things Applications (2015) Thesis's defense, Eurecom, Sophia Antipolis, 24 April 2015 PhD thesis (has been selected as one of the 10 nominees for Best PhD Thesis Price - Telecom ParisTech 2015 - France) Slides, Demo
  • 80. Bibliography ● Semantic Web Methodologies, Best Practices and Ontology Engineering Applied to Internet of Things IEEE World Forum on Internet of Things (WF-IoT), 2015 PDF, Paper via IEEE, Slides ● A survey and analysis of ontology-based software tools for semantic interoperability in IoT and WoT landscapes. IEEE World Forum on Internet of Things (WF-IoT), 2018 PDF ● Privacy, Security and Policies: A review of Problems and Solutions with Semantic Web Technologies, SWJ (2018) ● Social Semantic Web Access Control. International Workshop Social Data on the Web (SDoW), 2011. ● An Access Control Model for Linked Data International IFIP Workshop on Semantic Web & Web Semantics (SWWS), 2011