From: Efficient adaptive framework for securing the Internet of Things devices
Symbol | Description |
---|---|
N | Number of IoT devices |
M | Number of candidate encryption schemes |
\(R_{i}^{d}\) | Resources available at ith IoT device |
\(R_{k}^{s}\) | Minimum resources required to implement kth encryption scheme |
\(T_{i}^{d}\) | Required throughput for the ith IoT device |
\(T_{k}^{s}\) | Throughput given by the kth encryption scheme |
f 1 | Function to maximize the device throughput of an IoT device |
f 2 | Function to minimize the resources being used at an IoT device |
T min | Minimum throughput offered by any of the M encryption scheme |
R max | Maximum resources required by any of the M encryption scheme |
w | Weight factor to set priority for f1 and f2. |