Graph-based technique for survivability assessment and optimization of IoT applications

被引:0
|
作者
Vladimir Shakhov
Insoo Koo
机构
[1] University of Ulsan,
关键词
Internet of Things; Network topology; Intrusion models; System survivability;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT’s potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.
引用
收藏
页码:105 / 114
页数:9
相关论文
共 50 条
  • [21] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ, 2023, 11
  • [22] Graph-Based Random Sampling for Massive Access in IoT Networks
    Zhai, Shiyu
    Li, Guobing
    Qi, Zefeng
    Zhang, Guomei
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [23] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [24] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PeerJ Computer Science, 2023, 9
  • [25] A graph-based clustering method and its applications
    Foggia, Pasquale
    Percannella, Gennaro
    Sansone, Carlo
    Vento, Mario
    [J]. ADVANCES IN BRAIN, VISION, AND ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4729 : 277 - +
  • [26] Graph-based task replication for workflow applications
    Sirvent, Rauel
    Badia, Rosa M.
    Labarta, Jesus
    [J]. HPCC: 2009 11TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2009, : 20 - 28
  • [27] Graph-based data mining for biological applications
    Schietgat, Leander
    [J]. AI COMMUNICATIONS, 2011, 24 (01) : 95 - 96
  • [28] UPGRADE -: A framework for graph-based visual applications
    Jäger, D
    [J]. APPLICATIONS OF GRAPH TRANSFORMATIONS WITH INDUSTRIAL RELEVANCE, PROCEEDINGS, 2000, 1779 : 427 - 432
  • [29] Optimizing transistor networks using a graph-based technique
    Vinicius N. Possani
    Renato S. de Souza
    Julio S. Domingues
    Luciano V. Agostini
    Felipe S. Marques
    Leomar S. da Rosa
    [J]. Analog Integrated Circuits and Signal Processing, 2012, 73 : 841 - 850
  • [30] A Graph-based Context Learning Technique for Image Parsing
    Azam, Basim
    Verma, Brijesh
    [J]. 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,