IoTSec talk:T2.2

= Comments (around 10Aug2015 by Josef)=
 * harmonise T2.2.1... (twice mentioned), I would not see the PhD education as an own sub-task
 * be more specific on achieved results with timeline (M12, M24, M36....) - only mention results including M24
 * one deliverable looks too little (M12 only), I would expect another deliverable at M24

= Earlier descriptions =

=has subtask::T2.2.1 Implement event driven adaptive security=
 * review and extend established models
 * implement event-driven model addressing events such as RFID-based physical access control or sensor-based voltage monitoring by adapting and extending the work in the MASSIF Project (http://www.massif-project.eu/) for utilising and modelling “events”

T2.2.1 Implementation of adaptive security
Event driven adaptive security addresses events such as RFID-based physical access control or sensor-based voltage monitoring. An event-driven security security architecture is seen as a perfect candidate for real-time security monitoring of the entire grid operations. The basis of the work was addressed in the MASSIF Project (http://www.massif-project.eu/), and will be adapted and extended for utilising and modelling "events".

Adaptive security addresses the protection of "IoT-based smart grids" against evolutionary threats and attacks through the prediction and advanced behavioural analysis of big-real-data from IoT Smart Grids [32]. Our approach on adaptive security is based on [33], and security metrics methodology based on [34]. The adaptive security methodology addresses threats by increasing awareness and automating prevention, detection, and recovery from the failures of security and privacy protections at runtime by re-configuring control parameters and even changing structures and security goals. The objective is, therefore, to develop adaptive security mechanisms using the combination of evolutionary game theory and distributed behavioural analysis for Smart Grids. The expected outcome of this work are modules for use in the operational security.

Result: The expected outcome of this work are modules for use in the operational security Partners: NR, HIG Waqas Aman(IoTSec PostDoc)
 * A working prototype implementing adaptive security for IoT in Smart Grids.

Deliverable:
 * 1 technical report,
 * 2 conference papers