2017
DOI: 10.1145/3139293
|View full text |Cite
|
Sign up to set email alerts
|

Pareto Optimal Security Resource Allocation for Internet of Things

Abstract: In many Internet of Thing (IoT) application domains security is a critical requirement, because malicious parties can undermine the effectiveness of IoT-based systems by compromising single components and/or communication channels. Thus, a security infrastructure is needed to ensure the proper functioning of such systems even under attack. However, it is also critical that security be at a reasonable resource and energy cost. In this article, we focus on the problem of efficiently and effectively securing IoT … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…They further computed the GNE with a proximal-based algorithm, and the results revealed several situations that match real-world observations. Rullo et al [134] proposed a Pareto-optimal security resource allocation scheme to guarantee the proper functioning of an IoT-based system with reasonable resource overhead. They calculated the best defender strategy by formulating it as a linear optimization problem.…”
Section: Security Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…They further computed the GNE with a proximal-based algorithm, and the results revealed several situations that match real-world observations. Rullo et al [134] proposed a Pareto-optimal security resource allocation scheme to guarantee the proper functioning of an IoT-based system with reasonable resource overhead. They calculated the best defender strategy by formulating it as a linear optimization problem.…”
Section: Security Strategymentioning
confidence: 99%
“…Unauthorized access to the device could be forbidden by a user-selected policy [136] or allocating security resources carefully [134].…”
Section: Access Controlmentioning
confidence: 99%
“…A different work, done by Rullo et al [30], addresses the problem of allocating security resources on IoT networks. The authors present a method to automatically compute the optimal security resource allocation strategy that minimizes the total energy consumption, the installation cost, and the network's criticality.…”
Section: The Policy Rules Placement Problemmentioning
confidence: 99%
“…Semasinghe [36] discussed the multiple uncommon game theory model (e.g., evolutionary game, the average field game, and so on), so as to adapt to the inherent characteristics of IoT network in the future. For the resource allocation problem in IoT, Rullo [37] proposed a linear programming based formulation for solving the problem of optimally placing a set of security resources in static IoT networks, considering a fixed defender budget, the strategic behavior of the attacker, and modeling the interaction between attacker and defender as a Stackelberg game. Altman [38] proposed a game theory-based approach to study jamming attacks in wireless networks.…”
Section: Security Gamementioning
confidence: 99%