Rullo A, Serra E, Bertino E, Lobo J. Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. Computer Security – ESORICS 2017. Lecture Notes in Computer Science, vol 10493
List of results published directly linked with the projects co-funded by the Spanish Ministry of Economy and Competitiveness under the María de Maeztu Units of Excellence Program (MDM-2015-0502).
List of publications acknowledging the funding in Scopus.
The record for each publication will include access to postprints (following the Open Access policy of the program), as well as datasets and software used. Ongoing work with UPF Library and Informatics will improve the interface and automation of the retrieval of this information soon.
The MdM Strategic Research Program has its own community in Zenodo for material available in this repository as well as at the UPF e-repository
Rullo A, Serra E, Bertino E, Lobo J. Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. Computer Security – ESORICS 2017. Lecture Notes in Computer Science, vol 10493
Rullo A, Serra E, Bertino E, Lobo J. Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. Computer Security – ESORICS 2017. Lecture Notes in Computer Science, vol 10493.
We present a method for computing the best provisioning of security resources for Internet of Things (IoT) scenarios characterized by a high degree of mobility. The security infrastructure is specified by a security resource allocation plan computed as the solution of an optimization problem that minimizes the risk of having IoT devices not monitored by any resource. Due the mobile nature of IoT devices, a probabilistic framework for modeling such scenarios is adopted. We adapt the concept of shortfall from economics as a risk measure and show how to compute and evaluate the quality of an allocation plan. The proposed approach fits well with applications such as vehicular networks, mobile ad-hoc networks, smart cities, or any IoT environment characterized by mobile devices that needs a monitoring infrastructure.
Additional material:
- Dataset - Syslog, SNMP, and tcpdump data for 5 years or more from wireless network at Dartmouth College