Placement optimization of IoT security solutions for edge computing based on graph theory - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2019

Placement optimization of IoT security solutions for edge computing based on graph theory

Résumé

In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.
Fichier principal
Vignette du fichier
mainV2_forHAL.pdf (354.99 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02314892 , version 1 (14-10-2019)

Identifiants

  • HAL Id : hal-02314892 , version 1

Citer

Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Placement optimization of IoT security solutions for edge computing based on graph theory. 38th IEEE International Performance Computing and Communications Conference (IPCCC 2019), Oct 2019, London, United Kingdom. ⟨hal-02314892⟩
158 Consultations
318 Téléchargements

Partager

Gmail Facebook X LinkedIn More