Ensuring Security and Availability through Model-Based Cross-Layer Adaptation

نویسندگان

  • Minyoung Kim
  • Mark-Oliver Stehr
  • Ashish Gehani
  • Carolyn L. Talcott
چکیده

Situationand resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one layer to improve security affect security, timing, and power consumption at other layers. This paper argues for an integrated treatment of security across multiple layers of abstraction (application, middleware, operating system including network stack, and hardware). An important step in realizing this integrated treatment of situationand resource-aware security is first understanding the cross-layer interactions between security policies and then exploiting these interactions to design efficient adaptation strategies (i) to balance security, quality of service, and energy needs, and (ii) to maximize system availability. We propose a novel approach that employs a compositional method within an iterative tuning framework based on lightweight formal methods with dynamic adaptation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Cross Layer Techniques for Wireless Network Security for 802.11

Wireless technology has been gaining popularity over some years. Adaptation of standard depends on ease of use and level of security it provides..In this paper, we will study and compare Security techniques to detect attack in 802.11 by fusing multi-layer metrics is presented. We will discuss advantages and limitations of techniques of cross layer approach for wireless network security. Cross-l...

متن کامل

Adaptation-aware encryption of scalable H.264/AVC video for content security

Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combined with the appropriate cryptographic methods, effectively prevents the content against malicious attacks, so as to protect its authenticity as well as integrity. While encryption b...

متن کامل

GRACE: A Hierarchical Cross-Layer Adaptation Framework for Saving Energy

Mobile devices running soft real-time multimedia applications are becoming an increasingly important computing platform. Such systems are often limited by their battery life; therefore, minimizing their energy usage has become a primary design goal. A widely used technique to save energy is to adapt the system in response to changes in application demands and resource availability. Researchers ...

متن کامل

A Mathematical Model of Optimal Budget Allocation Based on Performance in the Social Security Organization

This research aims to provide a performance-based budgeting model in the social security organization which has independent and similar departments across the country. The statistical population of this research is the Social Security Organization Insurance's department. Following the library reviews and adapted from the performance indicators of the subcommittee of the insurance company's depu...

متن کامل

Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels

Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011