IoT systems use wireless links for local communication, where locality depends on the transmission range and include many devices with low computational power such as sensors. In IoT systems, security is a crucial requirement, but difficult to obtain, because standard cryptographic techniques have a cost that is usually unaffordable. We resort to an extended version of the process calculus LySa, called IoTLySa, to model the patterns of communication of IoT devices. Moreover, we assign rates to each transition to infer quantitative measures on the specified systems. The derived performance evaluation can be exploited to establish the cost of the possible security countermeasures.

Securing IoT communications: at what cost?

Galletta Letterio
2016-01-01

Abstract

IoT systems use wireless links for local communication, where locality depends on the transmission range and include many devices with low computational power such as sensors. In IoT systems, security is a crucial requirement, but difficult to obtain, because standard cryptographic techniques have a cost that is usually unaffordable. We resort to an extended version of the process calculus LySa, called IoTLySa, to model the patterns of communication of IoT devices. Moreover, we assign rates to each transition to infer quantitative measures on the specified systems. The derived performance evaluation can be exploited to establish the cost of the possible security countermeasures.
2016
IoT; security; performance
File in questo prodotto:
File Dimensione Formato  
Securing IoT communications.PDF

non disponibili

Licenza: Non specificato
Dimensione 574.94 kB
Formato Adobe PDF
574.94 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/7004
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
social impact