Skip to main content

Graph-based technique for survivability assessment and optimization of IoT applications

Abstract

The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT’s potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. 1.

    Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 2537 (2017)

    Article  Google Scholar 

  2. 2.

    Jan, S., Ahmed, S., Shakhov, V.V., Koo, I.: Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7, 42450–42471 (2019)

    Article  Google Scholar 

  3. 3.

    Uckelmann, D., Harrison, M., Michahelles, F.: Architecting the Internet of Thing, pp. 10–11. Springer, Berlin (2011)

    Book  Google Scholar 

  4. 4.

    Kamgueu, P.O., Nataf, E., Ndie, T.D.: Survey on RPL enhancements: a focus on topology, security and mobility. Comput. Commun. 120, 10–21 (2018)

    Article  Google Scholar 

  5. 5.

    Ciftcioglu, E., Pal, S., Chan, K., Cansever, D., Swami, A., Singh, A., Basu, P.: Topology design games and dynamics in adversarial environments. IEEE J. Sel. Areas Commun. 35(3), 628–642 (2017)

    Article  Google Scholar 

  6. 6.

    Elshqeirat, B., Soh, S., Rai, S., Lazarescu, M.: Topology design with minimal cost subject to network reliability constraint. IEEE Trans. Reliab. 64(1), 118–131 (2015)

    Article  Google Scholar 

  7. 7.

    Shakhov, V.V., Migov, D.A.: Reliability of ad hoc networks with imperfect nodes. Springer LNCS 8715, 49–58 (2014)

    MATH  Google Scholar 

  8. 8.

    Migov, D.: Parallel methods for network reliability calculation and cumulative updating of network reliability bounds. In: Proceedings of the IEEE 2nd Russian-Pacific Conference on Computer Technology and Applications, pp. 1–5 (2018)

  9. 9.

    Watanabe, T., Nakamura, A.: Edge-connectivity augmentation problems. J. Comput. Syst. Sci. 35(1), 96–144 (1987)

    MathSciNet  Article  Google Scholar 

  10. 10.

    Kuipers, F.A.: An overview of algorithms for network survivability. ISRN Commun. Netw. (2012). https://doi.org/10.5402/2012/932456

    Article  Google Scholar 

  11. 11.

    Meyerson, A., Tagiku, B.: Minimizing average shortest path distances via shortcut edge addition. Springer LNCS 5687, 272–285 (2009)

    MathSciNet  MATH  Google Scholar 

  12. 12.

    Wang, Z.: Deep learning-based intrusion detection with adversaries. IEEE Access 6, 38 367–38 384 (2018)

    Article  Google Scholar 

  13. 13.

    Shakhov, V.V., Koo, I.: Depletion-of-battery attack: specificity, modelling and analysis. Sensors 18(6), 1849 (2018)

    Article  Google Scholar 

  14. 14.

    Lima, M., dos Santos, A., Pujolle, G.: A survey of survivability in mobile ad hoc networks. IEEE Commun. Surv. Tutor. 11(1), 66–77 (2009)

    Article  Google Scholar 

  15. 15.

    Liu, J., et al.: New perspectives on future smart FiWi networks: scalability, reliability, and energy efficiency. IEEE Commun. Surv. Tutor. 18(2), 1045–72 (2016)

    Article  Google Scholar 

  16. 16.

    Khouzani, M., Sarkar, S., Altman, E.: Maximum damage malware attack in mobile wireless networks. IEEE/ACM Trans. Netw. 20(5), 1347–1360 (2012)

    Article  Google Scholar 

  17. 17.

    Heegaard, P.E., Trivedi, K.S.: Network survivability modeling. Comput. Netw. 53, 1215–1234 (2009)

    Article  Google Scholar 

  18. 18.

    Xie, Lang, Heegaard, Poul E., Jiang, Yuming: Survivability analysis of a two-tier infrastructure-based wireless network. Comput. Netw. 128, 28–40 (2017)

    Article  Google Scholar 

  19. 19.

    Yin, Y., et al.: Survivability analysis of weighted-edge attacks on complex networks with incomplete information. Physica A 531, 120957 (2019)

    Article  Google Scholar 

  20. 20.

    Enoch, S., Hong, J., Kim, D.: Security modelling and assessment of modern networks using time independent Graphical Security Models. J. Netw. Comput. Appl. 148, 102448 (2019)

    Article  Google Scholar 

  21. 21.

    Shakhov, V.V.: A graph-based method for performance analysis of energy harvesting wireless sensor networks reliability. Springer Lect. Notes Electr. Eng. 391, 127–132 (2016)

    Article  Google Scholar 

  22. 22.

    Shakhov, V.V.: On efficiency improvement of energy harvesting wireless sensor networks. In: IEEE Proceedings of the 39th International Conference on Telecommunications and Signal Processing, Vienna, pp. 56–59 (2016)

  23. 23.

    Shakhov, V.V.: Tradeoff between energy harvesting duration and reliability in Wireless Sensor Networks. In: IEEE Proceedings of 22nd Telecommunications Forum, Belgrade, pp. 292–295 (2014)

  24. 24.

    Couto, R., Secci, S., Campista, M., et al.: Reliability and survivability analysis of data center network topologies. J. Netw. Syst. Manag. 24, 346 (2016)

    Article  Google Scholar 

  25. 25.

    Frey, C., Zufle, A., Emrich, T., Renz, M.: Efficient information flow maximization in probabilistic graphs. IEEE Trans. Knowl. Data Eng. 30, 5 (2018)

    Article  Google Scholar 

  26. 26.

    Khan, A., Bonchi, F., Gullo, F., Nufer, A.: Conditional reliability in uncertain graphs. IEEE Trans. Knowl. Data Eng. 30, 11 (2018)

    Article  Google Scholar 

  27. 27.

    Stern, R., Song, J., Work, D.: Accelerated Monte Carlo system reliability analysis through machine-learning-based surrogate models of network connectivity. Reliab. Eng. Syst. Saf. 164, 1–9 (2017)

    Article  Google Scholar 

  28. 28.

    Migov, D., Weins, D.: Parallel implementation and simulation of network reliability calculation by Monte Carlo method. Vestn. Tomsk. Gos. Univ. 47, 159–164 (2019)

    Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding authors

Correspondence to Vladimir Shakhov or Insoo Koo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research was supported by the National Research Foundation (NRF) of Korea, funded by MEST (NRF-2017R1D1A3B03030386).

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Shakhov, V., Koo, I. Graph-based technique for survivability assessment and optimization of IoT applications. Int J Softw Tools Technol Transfer 23, 105–114 (2021). https://doi.org/10.1007/s10009-020-00594-9

Download citation

Keywords

  • Internet of Things
  • Network topology
  • Intrusion models
  • System survivability