From a9688cc0e0e438eafdddeabf5deb654943a05eef Mon Sep 17 00:00:00 2001 From: Duncan Date: Mon, 18 Jul 2016 20:03:17 -0400 Subject: [PATCH] Some edits on the tables and labeling. Fixed the table references issue. Need to: (1) add graph of SR(I), (2) mention pairing of risk and cost plus how different examination gives different results, (3) remove PBD image and AADL + listing section. --- AADLSecPaper.tex | 28 ++++++++++++++++++++++++---- 1 file changed, 24 insertions(+), 4 deletions(-) diff --git a/AADLSecPaper.tex b/AADLSecPaper.tex index 71261eb..bfc4b9b 100644 --- a/AADLSecPaper.tex +++ b/AADLSecPaper.tex @@ -533,10 +533,30 @@ Security Risk & 0 & 2.73 & 15.84 \\ \hline \caption{Calculated Security Risk for Wireless Transmitter} \end{table} -From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts. The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module; cost per design, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs. +From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts. + +%The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module; + +\begin{table}[] +\centering +\begin{tabular}{|c|c|} +\hline +\textbf{Component} & \textbf{Cost (\$)} \\ \hline +Antenna & 3 \\ \hline +IO Bus & 1 \\ \hline +Basic Processor & 15 \\ \hline +Pure Encryption & 20 \\ \hline +Modular Processor & 18 \\ \hline +Encryption Module & 8 \\ \hline +\end{tabular} +\caption{Table of Individual Part Costs} +\label{tbl:partCosts} +\end{table} + +The cost per design, using costs from Table~\ref{tbl:partCosts}, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs. %per 12 hours of operation (\textbf{How to ignore time aspect?}). %The $w_r$ value is assumed to be 1.00 if the system is encrypted and 0.10 is not; since the effect of not meeting requirements can be viewed more clearly. -Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and estimation metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}. +Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and security risk metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}. % and how different User Risk Types (URT) also further influence the metric. %% Please add the following required packages to your document preamble: @@ -556,14 +576,14 @@ Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:esti \begin{table}[] \centering -\label{tbl:calculations} \begin{tabular}{|c|c|c|c|c|} \hline & Design 1 & Design 2 & Design 3 & Design 4 \\ \hline Costs & 72 & 91 & 88 & 93 \\ \hline -Estimation Metric & 87.84 & 91 & 88 & 95.73 \\ \hline +Security Risk & 15.84 & 0 & 0 & 2 \\ \hline \end{tabular} \caption{Calculated Values for Wireless Transmitter Example (Units USD)} +\label{tbl:calculations} \end{table} Now that a simple example has been shown, allow this paper to now expand the considerations that are made for this simplistic example. The following section will examine further expansion of `estimation metric' considerations, showing how the calculation of comparable metrics can become more involved and complicated.