Applied graph theory to security: A qualitative placement of security solutions within IoT networks - Normandie Université Accéder directement au contenu
Article Dans Une Revue Journal of information security and applications Année : 2020

Applied graph theory to security: A qualitative placement of security solutions within IoT networks

Morgan Barbier
Chrystel Gaber
Jean-Luc Grimault
  • Fonction : Auteur
  • PersonId : 1099559

Résumé

The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.
Fichier principal
Vignette du fichier
JISA_submission.pdf (550.04 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03234135 , version 1 (25-05-2021)

Identifiants

Citer

Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of information security and applications, 2020, 55, pp.102640. ⟨10.1016/j.jisa.2020.102640⟩. ⟨hal-03234135⟩
84 Consultations
299 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More