Abstract:
The paper encompasses design and analysis of combined protection mechanisms applied to complex communication systems containing embedded and mobile devices. A notion of configuration is proposed in order to represent a combination of particular security building blocks deployed to support security of the device as well as software services it provides. Starting from functional and non-functional properties of specific building blocks the optimization problem allows arranging the search of the most effective configuration. Effectiveness evaluation of the configuring approach is conducted by means of its comparing with alternative configuring strategies, including “manual” configuring scenarios realized by an operator of the system without using any automated tools for enumeration and evaluation of configurations.
Keywords:configuration, embedded device, mobile device, security building block.