Graph-based technique for survivability assessment and optimization of IoT applications

被引:9
作者
Shakhov, Vladimir [1 ]
Koo, Insoo [1 ]
机构
[1] Univ Ulsan, Ulsan, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things; Network topology; Intrusion models; System survivability; INTRUSION DETECTION; TOPOLOGY DESIGN; RELIABILITY; INTERNET;
D O I
10.1007/s10009-020-00594-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT's potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 28 条
  • [1] Topology Design Games and Dynamics in Adversarial Environments
    Ciftcioglu, Ertugrul Necdet
    Pal, Siddharth
    Chan, Kevin S.
    Cansever, Derya H.
    Swami, Ananthram
    Singh, Ambuj K.
    Basu, Prithwish
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 628 - 642
  • [2] Reliability and Survivability Analysis of Data Center Network Topologies
    Couto, Rodrigo de Souza
    Secci, Stefano
    Mitre Campista, Miguel Elias
    Maciel Kosmalski Costa, Luis Henrique
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2016, 24 (02) : 346 - 392
  • [3] Topology Design with Minimal Cost Subject to Network Reliability Constraint
    Elshqeirat, Basima
    Soh, Sieteng
    Rai, Suresh
    Lazarescu, Mihai
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (01) : 118 - 131
  • [4] Security modelling and assessment of modern networks using time independent Graphical Security Models
    Enoch, Simon Yusuf
    Hong, Jin B.
    Kim, Dong Seong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 148
  • [5] Efficient Information Flow Maximization in Probabilistic Graphs
    Frey, Christian
    Zufle, Andreas
    Emrich, Tobias
    Renz, Matthias
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (05) : 880 - 894
  • [6] Network survivability modeling
    Heegaard, Poul E.
    Trivedi, Kishor S.
    [J]. COMPUTER NETWORKS, 2009, 53 (08) : 1215 - 1234
  • [7] Toward a Lightweight Intrusion Detection System for the Internet of Things
    Jan, Sana Ullah
    Ahmed, Saeed
    Shakhov, Vladimir
    Koo, Insoo
    [J]. IEEE ACCESS, 2019, 7 : 42450 - 42471
  • [8] Survey on RPL enhancements: A focus on topology, security and mobility
    Kamgueu, Patrick Olivier
    Nataf, Emmanuel
    Ndie, Thomas Djotio
    [J]. COMPUTER COMMUNICATIONS, 2018, 120 : 10 - 21
  • [9] Kamysz, 2018, P IEEE 2 RUSS PAC C, P1
  • [10] Conditional Reliability in Uncertain Graphs
    Khan, Arijit
    Bonchi, Francesco
    Gullo, Francesco
    Nufer, Andreas
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (11) : 2078 - 2092