Some edits on the tables and labeling. Fixed the table references iss…

…ue. Need to: (1) add graph of SR(I), (2) mention pairing of risk and cost plus how different examination gives different results, (3) remove PBD image and AADL + listing section.

@@ -533,10 +533,30 @@ \section{Exploring a Simple Implementation}

\caption{Calculated Security Risk for Wireless Transmitter}

\end{table}

From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts. The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module; cost per design, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs.

From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts.

%The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module;

\begin{table}[]

\centering

\begin{tabular}{|c|c|}

\hline

\textbf{Component} & \textbf{Cost (\$)} \\ \hline

Antenna & 3 \\ \hline

IO Bus & 1 \\ \hline

Basic Processor & 15 \\ \hline

Pure Encryption & 20 \\ \hline

Modular Processor & 18 \\ \hline

Encryption Module & 8 \\ \hline

\end{tabular}

\caption{Table of Individual Part Costs}

\label{tbl:partCosts}

\end{table}

The cost per design, using costs from Table~\ref{tbl:partCosts}, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs.

%per 12 hours of operation (\textbf{How to ignore time aspect?}).

%The $w_r$ value is assumed to be 1.00 if the system is encrypted and 0.10 is not; since the effect of not meeting requirements can be viewed more clearly.

Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and estimation metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}.

Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and security risk metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}.

% and how different User Risk Types (URT) also further influence the metric.

%% Please add the following required packages to your document preamble:

@@ -556,14 +576,14 @@ \section{Exploring a Simple Implementation}

\caption{Calculated Values for Wireless Transmitter Example (Units USD)}

\label{tbl:calculations}

\end{table}

Now that a simple example has been shown, allow this paper to now expand the considerations that are made for this simplistic example. The following section will examine further expansion of `estimation metric' considerations, showing how the calculation of comparable metrics can become more involved and complicated.