Skip to main content

Table 2 Symbol Description

From: Efficient adaptive framework for securing the Internet of Things devices

Symbol

Description

N

Number of IoT devices

M

Number of candidate encryption schemes

\(R_{i}^{d}\)

Resources available at ith IoT device

\(R_{k}^{s}\)

Minimum resources required to implement kth encryption scheme

\(T_{i}^{d}\)

Required throughput for the ith IoT device

\(T_{k}^{s}\)

Throughput given by the kth encryption scheme

f 1

Function to maximize the device throughput of an IoT device

f 2

Function to minimize the resources being used at an IoT device

T min

Minimum throughput offered by any of the M encryption scheme

R max

Maximum resources required by any of the M encryption scheme

w

Weight factor to set priority for f1 and f2.