Deploying Robust Security in Internet of Things
Title | Deploying Robust Security in Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Yu, R., Xue, G., Kilari, V. T., Zhang, X. |
Conference Name | 2018 IEEE Conference on Communications and Network Security (CNS) |
Keywords | cloud computing, Communication networks, conditional value-at-risk, expected case security risks, Internet of Things, Internet-of-Things, IoT devices, IoT security, IoT system, offloaded security mechanisms, optimal robust deployment, pubcrawl, Resiliency, resource-constrained nature, risk management, risk measurement, robust security, Robustness, Scalability, security, security incidents, security of data, security offloading, security risk, Stochastic computing, stochastic model, Stochastic processes, Uncertainty, worst-case security risks |
Abstract | Popularization of the Internet-of-Things (IoT) has brought widespread concerns on IoT security, especially in face of several recent security incidents related to IoT devices. Due to the resource-constrained nature of many IoT devices, security offloading has been proposed to provide good-enough security for IoT with minimum overhead on the devices. In this paper, we investigate the inevitable risk associated with security offloading: the unprotected and unmonitored transmission from IoT devices to the offloaded security mechanisms. An important challenge in modeling the security risk is the dynamic nature of IoT due to demand fluctuations and infrastructure instability. We propose a stochastic model to capture both the expected and worst-case security risks of an IoT system. We then propose a framework to efficiently address the optimal robust deployment of security mechanisms in IoT. We use results from extensive simulations to demonstrate the superb performance and efficiency of our approach compared to several other algorithms. |
URL | https://ieeexplore.ieee.org/document/8433219 |
DOI | 10.1109/CNS.2018.8433219 |
Citation Key | yu_deploying_2018 |
- risk management
- worst-case security risks
- uncertainty
- Stochastic processes
- stochastic model
- Stochastic computing
- security risk
- security offloading
- security of data
- security incidents
- security
- Scalability
- Robustness
- robust security
- risk measurement
- Cloud Computing
- resource-constrained nature
- Resiliency
- pubcrawl
- optimal robust deployment
- offloaded security mechanisms
- IoT system
- IoT security
- IoT devices
- Internet-of-Things
- Internet of Things
- expected case security risks
- conditional value-at-risk
- Communication networks