Green-Aware Security: Towards a new Research Field
نویسندگان
چکیده
Green Security is a new research field aimed at defining and investigating security solutions under an energy-aware perspective. The aim of Green Security is twofold: 1) evaluating the actual security mechanisms both considering the energy costs and the effectiveness; 2) building new security mechanisms by considering energy efficiency from the design phase. In this paper, we first provide a definition of Green-Aware Security and an early manifest. Thus, we investigate some formalism to model Green-Aware Security issues, then we provide a use case showing how it is possible to model the energy consumption of two Intrusion Detection System (IDS) strategies, then we leverage this model to assess the energy leakage due to the late discovery of bad packets. Finally, we discuss an introductory assessment of the energy costs related to security on mobile device, which is a promising research trend for Green-Aware Security.
منابع مشابه
SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems
Rob Antrobus Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.lancs.ac.uk [email protected] Sylvain Frey Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.lancs.ac.uk [email protected] Benjamin Green Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.la...
متن کاملA Revisit to the Incorporation of Context - Awareness in Affective Computing Systems
The research field of Human Computer Interaction (HCI) is moving towards more natural, sensitive and intelligent paradigms. Especially in domains such as Affective Computing (AC), incorporating interaction context has been identified as one of the most important requirements towards this concept. Nevertheless, research on modeling and utilizing context in affect-aware systems is quite scarce. I...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملGreen Energy-aware task scheduling using the DVFS technique in Cloud Computing
Nowdays, energy consumption as a critical issue in distributed computing systems with high performance has become so green computing tries to energy consumption, carbon footprint and CO2 emissions in high performance computing systems (HPCs) such as clusters, Grid and Cloud that a large number of parallel. Reducing energy consumption for high end computing can bring various benefits such as red...
متن کامل