Skip to content
Permalink
Browse files

Some edits on the tables and labeling. Fixed the table references iss…

…ue. Need to: (1) add graph of SR(I), (2) mention pairing of risk and cost plus how different examination gives different results, (3) remove PBD image and AADL + listing section.
  • Loading branch information
Duncan
Duncan committed Jul 19, 2016
1 parent 8695b95 commit a9688cc0e0e438eafdddeabf5deb654943a05eef
Showing with 24 additions and 4 deletions.
  1. +24 −4 AADLSecPaper.tex
@@ -533,10 +533,30 @@ \section{Exploring a Simple Implementation}
\caption{Calculated Security Risk for Wireless Transmitter}
\end{table}

From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts. The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module; cost per design, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs.
From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts.

%The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module;

\begin{table}[]
\centering
\begin{tabular}{|c|c|}
\hline
\textbf{Component} & \textbf{Cost (\$)} \\ \hline
Antenna & 3 \\ \hline
IO Bus & 1 \\ \hline
Basic Processor & 15 \\ \hline
Pure Encryption & 20 \\ \hline
Modular Processor & 18 \\ \hline
Encryption Module & 8 \\ \hline
\end{tabular}
\caption{Table of Individual Part Costs}
\label{tbl:partCosts}
\end{table}

The cost per design, using costs from Table~\ref{tbl:partCosts}, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs.
%per 12 hours of operation (\textbf{How to ignore time aspect?}).
%The $w_r$ value is assumed to be 1.00 if the system is encrypted and 0.10 is not; since the effect of not meeting requirements can be viewed more clearly.
Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and estimation metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}.
Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and security risk metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}.
% and how different User Risk Types (URT) also further influence the metric.

%% Please add the following required packages to your document preamble:
@@ -556,14 +576,14 @@ \section{Exploring a Simple Implementation}

\begin{table}[]
\centering
\label{tbl:calculations}
\begin{tabular}{|c|c|c|c|c|}
\hline
& Design 1 & Design 2 & Design 3 & Design 4 \\ \hline
Costs & 72 & 91 & 88 & 93 \\ \hline
Estimation Metric & 87.84 & 91 & 88 & 95.73 \\ \hline
Security Risk & 15.84 & 0 & 0 & 2 \\ \hline
\end{tabular}
\caption{Calculated Values for Wireless Transmitter Example (Units USD)}
\label{tbl:calculations}
\end{table}

Now that a simple example has been shown, allow this paper to now expand the considerations that are made for this simplistic example. The following section will examine further expansion of `estimation metric' considerations, showing how the calculation of comparable metrics can become more involved and complicated.

0 comments on commit a9688cc

Please sign in to comment.
You can’t perform that action at this time.