IoT systems use wireless links for local communication, where locality depends on the transmission range and include many devices with low computational power such as sensors. In IoT systems, security is a crucial requirement, but difficult to obtain, because standard cryptographic techniques have a cost that is usually unaffordable. We resort to an extended version of the process calculus LySa, called IoTLySa, to model the patterns of communication of IoT devices. Moreover, we assign rates to each transition to infer quantitative measures on the specified systems. The derived performance evaluation can be exploited to establish the cost of the possible security countermeasures.
Securing IoT communications: at what cost?
BODEI, CHIARA;GALLETTA, LETTERIO
2016-01-01
Abstract
IoT systems use wireless links for local communication, where locality depends on the transmission range and include many devices with low computational power such as sensors. In IoT systems, security is a crucial requirement, but difficult to obtain, because standard cryptographic techniques have a cost that is usually unaffordable. We resort to an extended version of the process calculus LySa, called IoTLySa, to model the patterns of communication of IoT devices. Moreover, we assign rates to each transition to infer quantitative measures on the specified systems. The derived performance evaluation can be exploited to establish the cost of the possible security countermeasures.File | Dimensione | Formato | |
---|---|---|---|
Securing IoT communications.PDF
accesso aperto
Tipologia:
Versione finale editoriale
Licenza:
Creative commons
Dimensione
574.94 kB
Formato
Adobe PDF
|
574.94 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.