Run-time Selection of Security Algorithms For Networked Devices

被引:0
|
作者
Taddeo, Antonio Vincenzo [1 ]
Ferrante, Alberto [1 ]
机构
[1] Univ Svizzera Italiana, Fac Informat, ALaRI, Lugano, Switzerland
关键词
Security; Quality of Service; Adaptive Systems; AHP; analytic hierarchy process; cryptographic algorithm selection; cryptography; utility function;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important challenges that need to be currently faced in securing resource-constrained embedded systems is optimizing the trade-off between resources used (energy consumption and computational capabilities required) and security requirements for cryptographic algorithms any adopted security solutions should guarantee an adequate level of protection, yet respecting constraints on computational resources and consumed power. In this paper a generic, efficient, and energy-aware mechanism to determine a correct: trade off between security requirements and resources consumed is proposed. The solution proposed relies on Analytic Hierarchy Process (AHP) to define priorities among different requirements and to compare different security solutions. A knapsack problem is formulated to select. the most relevant algorithms based on their utility and on available resources.
引用
收藏
页码:92 / 96
页数:5
相关论文
共 50 条
  • [1] Run-Time Verification of Networked Software
    Artho, Cyrille Valentin
    [J]. RUNTIME VERIFICATION, 2010, 6418 : 59 - 73
  • [2] Run-time verification of networked software
    Research Center for Information Security , National Institute of Advanced Industrial Science and Technology , Tokyo, Japan
    [J]. Lect. Notes Comput. Sci., (59-73):
  • [3] Run-time parameter selection and tuning for energy optimization algorithms
    Mauser, Ingo
    Dorscheid, Marita
    Schmeck, Hartmut
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8672 : 80 - 89
  • [4] Run-Time Parameter Selection and Tuning for Energy Optimization Algorithms
    Mauser, Ingo
    Dorscheid, Marita
    Schmeck, Hartmut
    [J]. PARALLEL PROBLEM SOLVING FROM NATURE - PPSN XIII, 2014, 8672 : 80 - 89
  • [5] Practical diagnostic algorithms for run-time systems
    Wang, W
    Jaw, L
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3476 - 3480
  • [6] Run-Time Security Traceability for Evolving Systems
    Bauer, Andreas
    Juerjens, Jan
    Yu, Yijun
    [J]. COMPUTER JOURNAL, 2011, 54 (01): : 58 - 87
  • [7] THE RUN-TIME EFFICIENCY OF PARALLEL ASYNCHRONOUS ALGORITHMS
    DUBOIS, M
    BRIGGS, FA
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1991, 40 (11) : 1260 - 1266
  • [8] Time-stamping algorithms for parallelization of loops at run-time
    Xu, CZ
    Chaudhary, V
    [J]. 11TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM, PROCEEDINGS, 1997, : 443 - 450
  • [9] An Ontology for run-time Verification of Security Certificates for SOA
    D'Agostini, Stefania
    Di Giacomo, Valentina
    Pandolfo, Claudia
    Presenza, Domenico
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 525 - 533
  • [10] Run-time switching between total order algorithms
    Mocito, Jose
    Rodrigues, Luis
    [J]. EURO-PAR 2006 PARALLEL PROCESSING, 2006, 4128 : 582 - 591