Biblio
Filters: Author is Bars, Jean-Marie Le [Clear All Filters]
Placement optimization of IoT security solutions for edge computing based on graph theory. 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC). :1—7.
.
2019. In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.