Design-Efficiency in Security

In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-efficiency of key updates. We employ probabilistic model checking approach and present our modelling and analysis study using PRISM model checker.

[1]  Andrew Hinton,et al.  PRISM: A Tool for Automatic Verification of Probabilistic Systems , 2006, TACAS.

[2]  Ender Yuksel Key Update Strategies for Wireless Sensor Networks , 2012 .

[3]  Flemming Nielson,et al.  Optimizing key updates in sensor networks , 2011, 2011 IEEE Sensors Applications Symposium.

[4]  Flemming Nielson,et al.  Key Update Assistant for resource-constrained networks , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[5]  Flemming Nielson,et al.  LBTool: A stochastic toolkit for leave-based key updates , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).