Applied graph theory to security: A qualitative placement of security solutions within IoT networks - Archive ouverte HAL Access content directly
Journal Articles Journal of information security and applications Year : 2020

Applied graph theory to security: A qualitative placement of security solutions within IoT networks

(1, 2) , (1) , (2) , (2) , (1)
1
2
Morgan Barbier
Chrystel Gaber
Jean-Luc Grimault
  • Function : Author
  • PersonId : 1099559

Abstract

The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.
Fichier principal
Vignette du fichier
JISA_submission.pdf (550.04 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-03234135 , version 1 (25-05-2021)

Identifiers

  • HAL Id : hal-03234135 , version 1

Cite

Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of information security and applications, 2020. ⟨hal-03234135⟩
37 View
120 Download

Share

Gmail Facebook Twitter LinkedIn More