Graph-based technique for survivability assessment and optimization of IoT applications

被引:9
作者
Shakhov, Vladimir [1 ]
Koo, Insoo [1 ]
机构
[1] Univ Ulsan, Ulsan, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things; Network topology; Intrusion models; System survivability; INTRUSION DETECTION; TOPOLOGY DESIGN; RELIABILITY; INTERNET;
D O I
10.1007/s10009-020-00594-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT's potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 28 条
  • [11] Maximum Damage Malware Attack in Mobile Wireless Networks
    Khouzani, M. H. R.
    Sarkar, Saswati
    Altman, Eitan
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (05) : 1347 - 1360
  • [12] Kuipers FA, 2012, ISRN COMMUN NETW, DOI [10.5402/2012/932456, DOI 10.5402/2012/932456]
  • [13] A Survey of Survivability in Mobile Ad Hoc Networks
    Lima, Michele Nogueira
    dos Santos, Aldri Luiz
    Pujolle, Guy
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 66 - 77
  • [14] New Perspectives on Future Smart FiWi Networks: Scalability, Reliability, and Energy Efficiency
    Liu, Jiajia
    Guo, Hongzhi
    Nishiyama, Hiroki
    Ujikawa, Hirotaka
    Suzuki, Kenichi
    Kato, Nei
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1045 - 1072
  • [15] Meyerson A, 2009, LECT NOTES COMPUT SC, V5687, P272, DOI 10.1007/978-3-642-03685-9_21
  • [16] Migov D, 2019, VESTN TOMSK GOS U, V47, P159
  • [17] Migov Denis A., 2014, Multiple-Access Communications. 7th International Workshop (MACOM 2014). Proceedings: LNCS 8715, P49, DOI 10.1007/978-3-319-10262-7_5
  • [18] Shakhov Vladimir, 2016, International Conference on Mobile and Wireless Technologies (ICMWT2016). LNEE 391, P127, DOI 10.1007/978-981-10-1409-3_14
  • [19] Depletion-of-Battery Attack: Specificity, Modelling and Analysis
    Shakhov, Vladimir
    Koo, Insoo
    [J]. SENSORS, 2018, 18 (06)
  • [20] Shakhov V, 2016, 2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P56, DOI 10.1109/TSP.2016.7760828