当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Applied graph theory to security: A qualitative placement of security solutions within IoT networks
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2020-10-13 , DOI: 10.1016/j.jisa.2020.102640
Tanguy Godquin , Morgan Barbier , Chrystel Gaber , Jean-Luc Grimault , Jean-Marie Le Bars

The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.



中文翻译:

将图论应用于安全性:物联网网络中安全性解决方案的定性定位

边缘计算的兴起实现了本地网络管理。服务不再聚集在云内部,而是遍布整个网络。在本文中,我们提出了一种根据设备功能在IoT网络内部署安全服务的方法。我们的方法使用设备功能将物联网网络建模为加权图。我们建议使用后者,使用支配集和图形权重来确定安全服务的最合适位置。我们使用基于网络安全功能(如IPsec服务)的真实数据,在基于实际数据的智能城市示例中介绍通过建议的方法获得的结果。结果表明,网络安全性总体提高,同时对信息流的影响最小,同时保留了降低的部署成本。

更新日期:2020-10-13
down
wechat
bug