Deploying robust security in internet of things

Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Xiang Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Popularization of the Internet-of-Things (IoT) has brought widespread concerns on IoT security, especially in face of several recent security incidents related to IoT devices. Due to the resource-constrained nature of many IoT devices, security offloading has been proposed to provide good-enough security for IoT with minimum overhead on the devices. In this paper, we investigate the inevitable risk associated with security offloading: The unprotected and unmonitored transmission from IoT devices to the offloaded security mechanisms. An important challenge in modeling the security risk is the dynamic nature of IoT due to demand fluctuations and infrastructure instability. We propose a stochastic model to capture both the expected and worst-case security risks of an IoT system. We then propose a framework to efficiently address the optimal robust deployment of security mechanisms in IoT. We use results from extensive simulations to demonstrate the superb performance and efficiency of our approach compared to several other algorithms.

Original languageEnglish (US)
Title of host publication2018 IEEE Conference on Communications and Network Security, CNS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538645864
DOIs
StatePublished - Aug 10 2018
Event6th IEEE Conference on Communications and Network Security, CNS 2018 - Beijing, China
Duration: May 30 2018Jun 1 2018

Other

Other6th IEEE Conference on Communications and Network Security, CNS 2018
CountryChina
CityBeijing
Period5/30/186/1/18

Keywords

  • conditional value-at-risk
  • Internet-of-Things
  • risk measurement
  • robustness
  • security offloading

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Deploying robust security in internet of things'. Together they form a unique fingerprint.

  • Cite this

    Yu, R., Xue, G., Kilari, V. T., & Zhang, X. (2018). Deploying robust security in internet of things. In 2018 IEEE Conference on Communications and Network Security, CNS 2018 [8433219] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CNS.2018.8433219