26.03.2015 Views

19SafQB

19SafQB

19SafQB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

92 Internet of Things Strategic Research and Innovation Agenda<br />

• Detection-oriented CEP: Focused on detecting combinations of<br />

events called event patterns or situations. A simple example of<br />

detecting a situation is to look for a specific sequence of events.<br />

Some of the research topics for the immediate future in the context of CEP are:<br />

• Distributed CEP: Since CEP core engines usually require powerful<br />

hardware and complex input data to consider, it is not easy to<br />

design and implement distributed systems capable of taking consistent<br />

decisions from non-centralised resources.<br />

• Definition of standardised interfaces: Currently, most of the CEP<br />

solutions are totally proprietary and not compliant with any type of<br />

standard format or interface. In addition, it is not easy to integrate<br />

these processes in other systems in an automated way. It is essential<br />

to standardise input and output interfaces in order to make CEP systems<br />

interoperable among themselves (thus enabling exchanging<br />

of input events and results) and to ease integration of CEP in other<br />

systems, just as any other step in the transformation or processing<br />

of data.<br />

• Improved security and privacy policies: CEP systems often<br />

imply the handling of “private” data that are incorporated to decision<br />

taking or elaboration of more complex data. It is necessary<br />

that all processes and synthetic data can be limited by well-defined<br />

rules and security constraints (that must be measurable, traceable<br />

and verifiable).<br />

2.9 Security, Privacy & Trust<br />

The Internet of Things presents security-related challenges that are identified<br />

in the IERC 2010 Strategic Research and Innovation Roadmap but some<br />

elaboration is useful as there are further aspects that need to be addressed<br />

by the research community. While there are a number of specific security,<br />

privacy and trust challenges in the IoT, they all share a number of transverse<br />

non-functional requirements:<br />

• Lightweight and symmetric solutions, Support for resource constrained<br />

devices<br />

• Scalable to billions of devices/transactions

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!