Graph-based technique for survivability assessment and optimization of IoT applications

被引:9
|
作者
Shakhov, Vladimir [1 ]
Koo, Insoo [1 ]
机构
[1] Univ Ulsan, Ulsan, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things; Network topology; Intrusion models; System survivability; INTRUSION DETECTION; TOPOLOGY DESIGN; RELIABILITY; INTERNET;
D O I
10.1007/s10009-020-00594-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT's potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 50 条
  • [1] Graph-based technique for survivability assessment and optimization of IoT applications
    Vladimir Shakhov
    Insoo Koo
    [J]. International Journal on Software Tools for Technology Transfer, 2021, 23 : 105 - 114
  • [2] Source Localization using Graph-based Optimization Technique
    Srirangarajan, Seshan
    Pesch, Dirk
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1127 - 1132
  • [3] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [4] A graph based model for survivability applications
    Krings, AW
    Azadmanesh, A
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2005, 164 (03) : 680 - 689
  • [5] A novel factor graph-based optimization technique for stereo correspondence estimation
    Hanieh Shabanian
    Madhusudhanan Balasubramanian
    [J]. Scientific Reports, 12
  • [6] A novel factor graph-based optimization technique for stereo correspondence estimation
    Shabanian, Hanieh
    Balasubramanian, Madhusudhanan
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [7] Task scheduling in cloud-based survivability applications using swarm optimization in IoT
    Al-Turjman, Fadi
    Hasan, Mohammed Zaki
    Al-Rizzo, Hussain
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (08)
  • [8] Low-Rank Riemannian Optimization for Graph-Based Clustering Applications
    Douik, Ahmed
    Hassibi, Babak
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (09) : 5133 - 5148
  • [9] Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications
    Chiu, David K. Y.
    Xu, Tao
    Gondra, Iker
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [10] On extended graph-based rewiring technique
    Chim, F. S.
    Wu, Y. L.
    [J]. ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 114 - 117