2017
DOI: 10.1007/978-3-319-66399-9_23
|View full text |Cite
|
Sign up to set email alerts
|

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios

Abstract: Abstract. We present a method for computing the best provisioning of security resources for Internet of Things (IoT) scenarios characterized by a high degree of mobility. The security infrastructure is specified by a security resource allocation plan computed as the solution of an optimization problem that minimizes the risk of having IoT devices not monitored by any resource. Due the mobile nature of IoT devices, a probabilistic framework for modeling such scenarios is adopted. We adapt the concept of shortfa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…In the field of IoT security, Monte Carlo method is applied to several scenarios. In the mobile Internet of Things scenario, Rullo [48] addressed the problem of security resource allocation by using the Monte Carlo method to generate different device configurations in a geographic area in order to evaluate the proposed method with several network topologies. Xu [17] focused on the transmission design for secure relay communications in IoT networks, where the communication is exposed to eavesdroppers with unknown number and locations, and exploited Monte Carlo model simulations to validate the theoretical result.…”
Section: Monte Carlo Methods In Iotmentioning
confidence: 99%
“…In the field of IoT security, Monte Carlo method is applied to several scenarios. In the mobile Internet of Things scenario, Rullo [48] addressed the problem of security resource allocation by using the Monte Carlo method to generate different device configurations in a geographic area in order to evaluate the proposed method with several network topologies. Xu [17] focused on the transmission design for secure relay communications in IoT networks, where the communication is exposed to eavesdroppers with unknown number and locations, and exploited Monte Carlo model simulations to validate the theoretical result.…”
Section: Monte Carlo Methods In Iotmentioning
confidence: 99%
“…In this regard, Rullo et al [45] showed how to determine Pareto-optimal resource allocation strategies on the basis of the network topology and the characteristics of the available security resources. This approach was later adapted for large-scale [46] and mobile [47] networks.…”
Section: Other Workmentioning
confidence: 99%
“…However, it has recently found use in computing and networking for robust optimization as well. For example, Rullo et al [25] and Yu et al [36] both used CVaR to represent and optimize security risks in IoT.…”
Section: Other Related Workmentioning
confidence: 99%