Title
Run-time selection of security algorithms for networked devices.
Abstract
One of the most important challenges that need to be currently faced in securing resource-constrained embedded systems is optimizing the trade-off between resources used (energy consumption and computational capabilities required) and security requirements for cryptographic algorithms: any adopted security solutions should guarantee an adequate level of protection, yet respecting constraints on computational resources and consumed power. In this paper a generic, efficient, and energy-aware mechanism to determine a correct trade off between security requirements and resources consumed is proposed. The solution proposed relies on Analytic Hierarchy Process (AHP) to define priorities among different requirements and to compare different security solutions. A knapsack problem is formulated to select the most relevant algorithms based on their utility and on available resources.
Year
DOI
Venue
2009
10.1145/1641944.1641963
Q2SWinet
Keywords
Field
DocType
different requirement,security algorithm,run-time selection,security,cryptography,available resource,utility function,quality of service,security solution,security requirement,cryptographic algorithm selection,correct trade,different security solution,computational resource,ahp,networked device,adequate level,adaptive systems,analytic hierarchy process,computational capability,knapsack problem,adaptive system,embedded system
Adaptive system,Computer science,Cryptography,Quality of service,Algorithm,Knapsack problem,Energy consumption,Computer security model,Analytic hierarchy process,Distributed computing
Conference
Citations 
PageRank 
References 
5
0.46
5
Authors
2
Name
Order
Citations
PageRank
Antonio Vicenzo Taddeo150.46
Alberto Ferrante27813.68