Skip to Main content Skip to Navigation
Journal articles

Applied graph theory to security: A qualitative placement of security solutions within IoT networks

Tanguy Godquin 1, 2 Morgan Barbier 1 Chrystel Gaber 2 Jean-Luc Grimault 2 Jean-Marie Le Bars 1 
1 Equipe SAFE - Laboratoire GREYC - UMR6072
GREYC - Groupe de Recherche en Informatique, Image et Instrumentation de Caen
Abstract : The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.
Document type :
Journal articles
Complete list of metadata
Contributor : Morgan Barbier Connect in order to contact the contributor
Submitted on : Tuesday, May 25, 2021 - 11:22:47 AM
Last modification on : Saturday, June 25, 2022 - 9:56:42 AM
Long-term archiving on: : Thursday, August 26, 2021 - 6:53:54 PM


Files produced by the author(s)


  • HAL Id : hal-03234135, version 1


Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of information security and applications, Elsevier, 2020. ⟨hal-03234135⟩



Record views


Files downloads