Skip to Main content Skip to Navigation
Journal articles

Applied graph theory to security: A qualitative placement of security solutions within IoT networks

Tanguy Godquin 1, 2 Morgan Barbier 1 Chrystel Gaber 2 Jean-Luc Grimault 2 Jean-Marie Le Bars 1
1 Equipe Monétique & Biométrie - Laboratoire GREYC - UMR6072
GREYC - Groupe de Recherche en Informatique, Image, Automatique et Instrumentation de Caen
Abstract : The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.
Document type :
Journal articles
Complete list of metadata

https://hal-normandie-univ.archives-ouvertes.fr/hal-03234135
Contributor : Morgan Barbier <>
Submitted on : Tuesday, May 25, 2021 - 11:22:47 AM
Last modification on : Wednesday, May 26, 2021 - 3:26:09 AM

File

JISA_submission.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-03234135, version 1

Citation

Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of information security and applications, Elsevier, 2020. ⟨hal-03234135⟩

Share

Metrics

Record views

17

Files downloads

16