Placement optimization of IoT security solutions for edge computing based on graph theory

In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.

[1]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[2]  Matthias Dehmer,et al.  Quantitative graph theory : mathematical foundations and applications , 2014 .

[3]  Thierry Coupaye,et al.  Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog , 2018, SAC.

[4]  Guy Pujolle,et al.  QoS-Aware VNF Placement Optimization in Edge-Central Carrier Cloud Architecture , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[5]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[6]  Tal Mizrahi,et al.  Proof of Transit , 2019 .

[7]  Gert Sabidussi,et al.  The centrality index of a graph , 1966 .

[8]  Aiman Erbad,et al.  Edge computing for interactive media and video streaming , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[9]  Britta Ruhnau,et al.  Eigenvector-centrality - a node-centrality? , 2000, Soc. Networks.

[10]  Md Mehedi Hassan Onik,et al.  A Novel Approach for Network Attack Classification Based on Sequential Questions , 2018, ArXiv.

[11]  Philipp Leitner,et al.  Optimized IoT service placement in the fog , 2017, Service Oriented Computing and Applications.

[12]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[13]  P. Banerjee,et al.  Optimality criterion for the insertion of multi-interface nodes to improve connectivity in heterogeneous IoT framework , 2017, 2017 Devices for Integrated Circuit (DevIC).

[14]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[15]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[16]  Beibei Li,et al.  Mobile Targeting Using Customer Trajectory Patterns , 2019, Manag. Sci..

[17]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.

[18]  Pascal Urien,et al.  Internet of Things: A Definition & Taxonomy , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[19]  Arnaud Legrand,et al.  Fog Based Framework for IoT Service Provisioning , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).