{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:20:19Z","timestamp":1771482019597,"version":"3.50.1"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Technological District on Cyber Security PON Project","award":["PON03PE_00032_2"],"award-info":[{"award-number":["PON03PE_00032_2"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ACI-547358"],"award-info":[{"award-number":["ACI-547358"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Italian Ministry of University and Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2017,11,30]]},"abstract":"<jats:p>\n            In many Internet of Thing (IoT) application domains security is a critical requirement, because malicious parties can undermine the effectiveness of IoT-based systems by compromising single components and\/or communication channels. Thus, a security infrastructure is needed to ensure the proper functioning of such systems even under attack. However, it is also critical that security be at a reasonable resource and energy cost. In this article, we focus on the problem of efficiently and effectively securing IoT networks by carefully allocating security resources in the network area. In particular, given a set of security resources\n            <jats:italic>R<\/jats:italic>\n            and a set of attacks to be faced\n            <jats:italic>A<\/jats:italic>\n            , our method chooses the subset of\n            <jats:italic>R<\/jats:italic>\n            that best addresses the attacks in\n            <jats:italic>A<\/jats:italic>\n            , and the set of locations where to place them, that ensure the security coverage of all IoT devices at minimum cost and energy consumption. We model our problem according to game theory and provide a Pareto-optimal solution in which the cost of the security infrastructure, its energy consumption, and the probability of a successful attack are minimized. Our experimental evaluation shows that our technique improves the system robustness in terms of packet delivery rate for different network topologies. Furthermore, we also provide a method for handling the computation of the resource allocation plan for large-scale networks scenarios, where the optimization problem may require an unreasonable amount of time to be solved. We show how our proposed method drastically reduces the computing time, while providing a reasonable approximation of the optimal solution.\n          <\/jats:p>","DOI":"10.1145\/3139293","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T14:19:33Z","timestamp":1509027573000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Pareto Optimal Security Resource Allocation for Internet of Things"],"prefix":"10.1145","volume":"20","author":[{"given":"Antonino","family":"Rullo","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Daniele","family":"Midi","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Edoardo","family":"Serra","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689499.1689572"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080726"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424845"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0160-y"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_23"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833860"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX\u201904)","author":"Girod Lewis","year":"2004"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.622504"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689499.1689536"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201903)","author":"Hu Yih-Chun"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"e_1_2_1_17_1","first-page":"15","article-title":"6LoWPAN","volume":"802","author":"Hui Jonathan","year":"2009","journal-title":"Incorporating IEEE"},{"key":"e_1_2_1_18_1","unstructured":"IEEEE. 2007. IEEE 802.15 WPAN Task Group 4 (TG4). Retrieved from http:\/\/www.ieee802.org\/15\/pub\/TG4.html.  IEEEE. 2007. IEEE 802.15 WPAN Task Group 4 (TG4). Retrieved from http:\/\/www.ieee802.org\/15\/pub\/TG4.html."},{"key":"e_1_2_1_19_1","unstructured":"IBM ILOG. 2011. CPLEX 12.5. (2011).  IBM ILOG. 2011. CPLEX 12.5. (2011)."},{"key":"e_1_2_1_20_1","unstructured":"Devesh Jinwala Dhiren Patel and Kankar Dasgupta. 2012. FlexiSec: A configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203.4697 (2012).  Devesh Jinwala Dhiren Patel and Kankar Dasgupta. 2012. FlexiSec: A configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203.4697 (2012)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.007"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_24_1","unstructured":"P. Levis S. Madden J. Polastre R. Szewczyk K. Whitehouse A. Woo D. Gay J. Hill M. Welsh E. Brewer and D. Culler. 2005. TinyOS: An operating system for sensor networks. In Ambient Intelligence. Springer Berlin.  P. Levis S. Madden J. Polastre R. Szewczyk K. Whitehouse A. Woo D. Gay J. Hill M. Welsh E. Brewer and D. Culler. 2005. TinyOS: An operating system for sensor networks. In Ambient Intelligence. Springer Berlin."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00016-3"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-002-0276-1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.104"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570754"},{"key":"e_1_2_1_31_1","unstructured":"Raymond T. Ng and Jiawei Han. 1994. Efficient and effective clustering methods for spatial data mining.  Raymond T. Ng and Jiawei Han. 1994. Efficient and effective clustering methods for spatial data mining."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.406"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.01.009"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3055001"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_23"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699907"},{"key":"e_1_2_1_39_1","unstructured":"Kalpana Sharma and M. K. Ghose. 2010. Wireless sensor networks: An overview on its security threats. IJCA Special Issue on Mobile Ad-Hoc Networks MANETs. 42--45.  Kalpana Sharma and M. K. Ghose. 2010. Wireless sensor networks: An overview on its security threats. IJCA Special Issue on Mobile Ad-Hoc Networks MANETs. 42--45."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1818318.1818544"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the European Simulation Multiconference (ESM\u201901)","author":"Andr\u00e1s"},{"key":"e_1_2_1_42_1","unstructured":"Heinrich von Stackelberg Damien Bazin Rowland Hill and Lynn Urch. 2010. Market Structure and Equilibrium. Springer Berlin.  Heinrich von Stackelberg Damien Bazin Rowland Hill and Lynn Urch. 2010. Market Structure and Equilibrium. Springer Berlin."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN\u201910)","author":"Zhang Dazhi","year":"2010"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772059"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426481"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502451"},{"key":"e_1_2_1_47_1","unstructured":"Alliance Zigbee. 2006. Zigbee specification. ZigBee document 053474r13 (2006).  Alliance Zigbee. 2006. Zigbee specification. ZigBee document 053474r13 (2006)."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139293","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:49Z","timestamp":1750212829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,24]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11,30]]}},"alternative-id":["10.1145\/3139293"],"URL":"https:\/\/doi.org\/10.1145\/3139293","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,24]]},"assertion":[{"value":"2017-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}