Visible to the public Placement optimization of IoT security solutions for edge computing based on graph theory

TitlePlacement optimization of IoT security solutions for edge computing based on graph theory
Publication TypeConference Paper
Year of Publication2019
AuthorsGodquin, Tanguy, Barbier, Morgan, Gaber, Chrystel, Grimault, Jean-Luc, Bars, Jean-Marie Le
Conference Name2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)
Date PublishedOct. 2019
PublisherIEEE
ISBN Number978-1-7281-1025-7
KeywordsCentrality, centrality metrics, computer network security, Computing Theory, cryptography, dominating set, edge computing, edge computing security, EndToEnd like encryption, graph theory, Internet of Things, IoT, IoT network, IoT security framework, IoT security solutions, Metrics, placement optimization, pubcrawl, security as a service, security functions, security metrics
Abstract

In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.

URLhttps://ieeexplore.ieee.org/document/8958767
DOI10.1109/IPCCC47392.2019.8958767
Citation Keygodquin_placement_2019