Ensuring Security and Availability through Model-Based Cross-Layer Adaptation
نویسندگان
چکیده
Situationand resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one layer to improve security affect security, timing, and power consumption at other layers. This paper argues for an integrated treatment of security across multiple layers of abstraction (application, middleware, operating system including network stack, and hardware). An important step in realizing this integrated treatment of situationand resource-aware security is first understanding the cross-layer interactions between security policies and then exploiting these interactions to design efficient adaptation strategies (i) to balance security, quality of service, and energy needs, and (ii) to maximize system availability. We propose a novel approach that employs a compositional method within an iterative tuning framework based on lightweight formal methods with dynamic adaptation.
منابع مشابه
Comparison of Cross Layer Techniques for Wireless Network Security for 802.11
Wireless technology has been gaining popularity over some years. Adaptation of standard depends on ease of use and level of security it provides..In this paper, we will study and compare Security techniques to detect attack in 802.11 by fusing multi-layer metrics is presented. We will discuss advantages and limitations of techniques of cross layer approach for wireless network security. Cross-l...
متن کاملAdaptation-aware encryption of scalable H.264/AVC video for content security
Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combined with the appropriate cryptographic methods, effectively prevents the content against malicious attacks, so as to protect its authenticity as well as integrity. While encryption b...
متن کاملGRACE: A Hierarchical Cross-Layer Adaptation Framework for Saving Energy
Mobile devices running soft real-time multimedia applications are becoming an increasingly important computing platform. Such systems are often limited by their battery life; therefore, minimizing their energy usage has become a primary design goal. A widely used technique to save energy is to adapt the system in response to changes in application demands and resource availability. Researchers ...
متن کاملA Mathematical Model of Optimal Budget Allocation Based on Performance in the Social Security Organization
This research aims to provide a performance-based budgeting model in the social security organization which has independent and similar departments across the country. The statistical population of this research is the Social Security Organization Insurance's department. Following the library reviews and adapted from the performance indicators of the subcommittee of the insurance company's depu...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011