{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:17Z","timestamp":1761663677222,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663982"},{"type":"electronic","value":"9783319663999"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66399-9_23","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T14:03:24Z","timestamp":1502460204000},"page":"419-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios"],"prefix":"10.1007","author":[{"given":"Antonino","family":"Rullo","sequence":"first","affiliation":[]},{"given":"Edoardo","family":"Serra","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Gamaev, A.: Jamming in wireless networks: the case of several jammers. In: Proceedings of the First ICST International Conference on Game Theory for Networks (2009)","DOI":"10.1109\/GAMENETS.2009.5137448"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Alwajeeh, T., Combeau, P., Bounceur, A., Vauzelle, R.: Efficient method for associating radio propagation models with spatial partitioning for smart city applications. In: Proceedings of the International Conference on Internet of Things and Cloud Computing, p. 8. ACM (2016)","DOI":"10.1145\/2896387.2901918"},{"issue":"7","key":"23_CR3","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1016\/S0165-1889(03)00109-X","volume":"28","author":"D Bertsimas","year":"2004","unstructured":"Bertsimas, D., Lauprete, G.J., Samarov, A.: Shortfall as a risk measure: properties, optimization and applications. J. Econ. Dyn. Control 28(7), 1353\u20131381 (2004)","journal-title":"J. Econ. Dyn. Control"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Charoen, P., Ohtsuki, T.: Codebook based interference mitigation with base station cooperation in multi-cell cellular network. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/VETECF.2011.6093033"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-29963-6_11","volume-title":"Security and Trust Management","author":"L Chen","year":"2012","unstructured":"Chen, L., Crampton, J.: Risk-aware role-based access control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 140\u2013156. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-29963-6_11"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, H.T., Zhuang, W.: Pareto optimal resource management for wireless mesh networks with QoS assurance: joint node clustering and subcarrier allocation. IEEE Trans. Wireless Commun. (2009)","DOI":"10.1109\/TWC.2008.080726"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Chigan, C., Li, L., Ye, Y.: Resource-aware self-adaptive security provisioning in mobile ad hoc networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2118\u20132124. IEEE (2005)","DOI":"10.1109\/WCNC.2005.1424845"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2000","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182\u2013197 (2000)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"23_CR9","first-page":"40","volume":"1274","author":"J Goldhirsh","year":"1998","unstructured":"Goldhirsh, J., Vogel, W.J.: Handbook of propagation effects for vehicular and personal mobile satellite systems. NASA Ref. Publ. 1274, 40\u201367 (1998)","journal-title":"NASA Ref. Publ."},{"key":"23_CR10","unstructured":"Gonsalves, A.: New toolkit seeks routers, internet of things for DDoS botnet (2014). http:\/\/www.csoonline.com\/article\/2687653\/data-protection\/new-toolkit-seeks-\/routers-internet-of-things-for-ddos-botnet.html. Accessed May 2016"},{"issue":"11","key":"23_CR11","doi-asserted-by":"publisher","first-page":"5800","DOI":"10.1109\/TWC.2013.100113.130220","volume":"12","author":"A Guo","year":"2013","unstructured":"Guo, A., Haenggi, M.: Spatial stochastic models and metrics for the structure of base stations in cellular networks. IEEE Trans. Wireless Commun. 12(11), 5800\u20135812 (2013)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Huang, Y.A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, pp. 135\u2013147. ACM, New York (2003). http:\/\/doi.acm.org\/10.1145\/986858.986877","DOI":"10.1145\/986858.986877"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hui, J., Culler, D., Chakrabarti, S.: 6LoWPAN: incorporating IEEE 802.15.4 into the IP architecture. IPSO Alliance White Paper 3 (2009)","DOI":"10.1145\/1460412.1460415"},{"key":"23_CR14","unstructured":"IEEE: IEEE 802.15 WPAN Task Group 4 (TG4). http:\/\/www.ieee802.org\/15\/pub\/TG4.html"},{"key":"23_CR15","unstructured":"Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. arXiv preprint (2012). arXiv:1203.4697"},{"key":"23_CR16","unstructured":"Kotz, D., Henderson, T., Abyzov, I., Yeo, J.: CRAWDAD dataset dartmouth\/campus (v. 2009\u201309-09), September 2009"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Kotz, D., Newport, C., Gray, R.S., Liu, J., Yuan, Y., Elliott, C.: Experimental evaluation of wireless simulation assumptions. In: Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 78\u201382. ACM (2004)","DOI":"10.1145\/1023663.1023679"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1111\/j.1540-6261.1978.tb04867.x","volume":"33","author":"H Levy","year":"1978","unstructured":"Levy, H., Kroll, Y.: Ordering uncertain options with borrowing and lending. J. Finance 33(2), 553\u2013574 (1978)","journal-title":"J. Finance"},{"issue":"2","key":"23_CR19","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s00158-002-0276-1","volume":"25","author":"A Messac","year":"2003","unstructured":"Messac, A., Ismail-Yahaya, A., Mattson, C.A.: The normalized normal constraint method for generating the pareto frontier. Struct. Multidiscip. Optim. 25(2), 86\u201398 (2003)","journal-title":"Struct. Multidiscip. Optim."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis: a system for knowledge-driven adaptable intrusion detection for the internet of things. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017)","DOI":"10.1109\/ICDCS.2017.104"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"A Mishra","year":"2004","unstructured":"Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Commun. 11(1), 48\u201360 (2004)","journal-title":"IEEE Wireless Commun."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Molloy, I., Cheng, P.C., Rohatgi, P.: Trading in risk: using markets to improve access control. In: Proceedings of the 2008 Workshop on New Security Paradigms, pp. 107\u2013125. ACM (2009)","DOI":"10.1145\/1595676.1595694"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Molloy, I., Dickens, L., Morisset, C., Cheng, P.C., Lobo, J., Russo, A.: Risk-based security decisions under uncertainty. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 157\u2013168. ACM (2012)","DOI":"10.1145\/2133601.2133622"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Nasipuri, A., Li, K.: A directionality based location discovery scheme for wireless sensor networks. In: Proceedings of 1st ACM International Workshop on Wireless Sensor Networks and Applications. ACM (2002)","DOI":"10.1145\/570738.570754"},{"key":"23_CR25","volume-title":"Wireless Communications: Principles and Practice","author":"TS Rappaport","year":"1996","unstructured":"Rappaport, T.S., et al.: Wireless Communications: Principles and Practice, vol. 2. Prentice Hall PTR, Upper Saddle River (1996)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Raza, S., Duquennoy, S., H\u00f6glund, J., Roedig, U., Voigt, T.: Secure communication for the internet of things\u2013a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. (2012)","DOI":"10.1002\/sec.406"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. (2013)","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"23_CR28","volume-title":"Monte Carlo Statistical Methods","author":"C Robert","year":"2013","unstructured":"Robert, C., Casella, G.: Monte Carlo Statistical Methods. Springer Science & Business Media, Berlin (2013)"},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","volume":"37","author":"R Roman","year":"2011","unstructured":"Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147\u2013159 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Rullo, A., Midi, D., Serra, E., Bertino, E.: A game of things: strategic allocation of security resources for IoT. In: ACM\/IEEE 2nd International Conference on Internet of Things Design and Implementation (IoTDI 2017), p. 6 (2017)","DOI":"10.1145\/3054977.3055001"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Serra, E., Jajodia, S., Pugliese, A., Rullo, A., Subrahmanian, V.: Pareto-optimal adversarial defense of enterprise systems. ACM Trans. Inf. Syst. Secur. (TISSEC) (2015)","DOI":"10.1145\/2699907"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Shen, X., Xu, K., Sun, X., Wu, J., Lin, J.: Optimized indoor wireless propagation model in WIFI-RoF network architecture for RSS-based localization in the internet of things. In: 2011 International Topical Meeting on & Microwave Photonics Conference Microwave Photonics, 2011 Asia-Pacific, MWP\/APMP, pp. 274\u2013277. IEEE (2011)","DOI":"10.1109\/MWP.2011.6088723"},{"issue":"7392","key":"23_CR33","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1038\/nature10856","volume":"484","author":"F Simini","year":"2012","unstructured":"Simini, F., Gonz\u00e1lez, M.C., Maritan, A., Barab\u00e1si, A.L.: A universal model for mobility and migration patterns. Nature 484(7392), 96\u2013100 (2012)","journal-title":"Nature"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Sultana, S., Midi, D., Bertino, E.: Kinesis: a security incident response and prevention system for wireless sensor networks. In: Proceedings of ACM SensSys (2014)","DOI":"10.1145\/2668332.2668351"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. In: ICICS 2009 (2009)","DOI":"10.1109\/ICICS.2009.5397594"},{"key":"23_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11710-7","volume-title":"Internet of Things","author":"RH Weber","year":"2010","unstructured":"Weber, R.H., Weber, R.: Internet of Things, vol. 12. Springer, Heidelberg (2010)"},{"issue":"9","key":"23_CR37","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of things. Int. J. Commun. Syst. 25(9), 1101 (2012)","journal-title":"Int. J. Commun. Syst."},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Li, H., Han, Z., Basar, T.: A stochastic game model for jamming in multi-channel cognitive radio systems. In: IEEE ICC (2010)","DOI":"10.1109\/ICC.2010.5502451"},{"key":"23_CR39","unstructured":"ZigBee Alliance and others: Zigbee specification (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66399-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:00:34Z","timestamp":1750802434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66399-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663982","9783319663999"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66399-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}