HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Placement optimization of IoT security solutions for edge computing based on graph theory

Tanguy Godquin 1, 2 Morgan Barbier 1 Chrystel Gaber 2 Jean-Luc Grimault 2 Jean-Marie Le Bars 1
1 Equipe SAFE - Laboratoire GREYC - UMR6072
GREYC - Groupe de Recherche en Informatique, Image et Instrumentation de Caen
Abstract : In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-02314892
Contributor : Tanguy Godquin Connect in order to contact the contributor
Submitted on : Monday, October 14, 2019 - 9:33:00 AM
Last modification on : Wednesday, November 3, 2021 - 5:07:35 AM
Long-term archiving on: : Wednesday, January 15, 2020 - 1:05:46 PM

File

mainV2_forHAL.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-02314892, version 1

Citation

Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Placement optimization of IoT security solutions for edge computing based on graph theory. 38th IEEE International Performance Computing and Communications Conference (IPCCC 2019), Oct 2019, London, United Kingdom. ⟨hal-02314892⟩

Share

Metrics

Record views

122

Files downloads

238