Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios

نویسندگان

  • Antonino Rullo
  • Edoardo Serra
  • Elisa Bertino
  • Jorge Lobo
چکیده

We present a method for computing the best provisioning of security resources for Internet of Things (IoT) scenarios characterized by a high degree of mobility. The security infrastructure is specified by a security resource allocation plan computed as the solution of an optimization problem that minimizes the risk of having IoT devices not monitored by any resource. Due the mobile nature of IoT devices, a probabilistic framework for modeling such scenarios is adopted. We adapt the concept of shortfall from economics as a risk measure and show how to compute and evaluate the quality of an allocation plan. The proposed approach fits well with applications such as vehicular networks, mobile ad-hoc networks, smart cities, or any IoT environment characterized by mobile devices that needs a monitoring infrastructure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliability and Supply Security based Method for Simultaneous Placement of Sectionalizer Switch and DER Units

This paper presents a new and useful methodology for simultaneous allocation of sectionalizer switches and distributed energy resources (DERs) considering both reliability and supply security aspects. The proposed algorithm defines the proper locations of sectionalizer switching devices in radial distribution networks considering the effect of DER units in the presented cost function and other ...

متن کامل

Secure Storage, Distribution and Processing of Iot Based Data through Mobile Cloud Computing-a Survey

The Internet of Things(IOT) is an interconnection of various devices embedded with sensors, software and electronics, which connects to the internet through one of the communication channel -A mobile application. Although through mobile, data can be stored, distributed and processed but, due to the high volumes of data generated by IOT devices, a resource poor device like mobile would not able ...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Impact of Capacity of Mobile Units on Blood Supply Chain Performance: Results from a Robust Analysis

Background and Objectives: A sudden jump in blood demand during natural disasters may have strong negative impact on the performance of blood supply chain. Appropriate response to emergency situations requires predictive approach to determining the optimal allocation of blood supply chain resources for various disaster scenarios. The present study, thus, presents an optimization model aimed at ...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017