Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
Some edits on the tables and labeling. Fixed the table references iss…
…ue. Need to: (1) add graph of SR(I), (2) mention pairing of risk and cost plus how different examination gives different results, (3) remove PBD image and AADL + listing section.
  • Loading branch information
Duncan committed Jul 19, 2016
1 parent 8695b95 commit a9688cc
Showing 1 changed file with 24 additions and 4 deletions.
28 changes: 24 additions & 4 deletions AADLSecPaper.tex
Expand Up @@ -533,10 +533,30 @@ Security Risk & 0 & 2.73 & 15.84 \\ \hline
\caption{Calculated Security Risk for Wireless Transmitter} \caption{Calculated Security Risk for Wireless Transmitter}
\end{table} \end{table}


From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts. The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module; cost per design, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs. From this point, we make further assumptions about the implementation cost ($c_i$), security implementation cost ($c_{si}$), the maintenance cost ($c_m$), and operational cost ($c_o$) since these values would come from metrics internal to a company or organization. $c_i$ is taken to be an aggregation of the individual cost of parts.

%The costs assumed are \$3 per antenna, \$1 per IO bus, \$15 for a basic processor, \$20 for an encryption optimized processor, \$18 for processor that works with embedded technology, and \$8 for an encryption module;

\begin{table}[]
\centering
\begin{tabular}{|c|c|}
\hline
\textbf{Component} & \textbf{Cost (\$)} \\ \hline
Antenna & 3 \\ \hline
IO Bus & 1 \\ \hline
Basic Processor & 15 \\ \hline
Pure Encryption & 20 \\ \hline
Modular Processor & 18 \\ \hline
Encryption Module & 8 \\ \hline
\end{tabular}
\caption{Table of Individual Part Costs}
\label{tbl:partCosts}
\end{table}

The cost per design, using costs from Table~\ref{tbl:partCosts}, from 1-{}-4, are {19,28,24,34}, respectively. $c_{si}$ is taken to be \$10 for AES256 and \$6 for AES128, $c_m$ is taken to be \$50 in drive out cost, and $c_o$ is assumed to be \$3 in operative power costs.
%per 12 hours of operation (\textbf{How to ignore time aspect?}). %per 12 hours of operation (\textbf{How to ignore time aspect?}).
%The $w_r$ value is assumed to be 1.00 if the system is encrypted and 0.10 is not; since the effect of not meeting requirements can be viewed more clearly. %The $w_r$ value is assumed to be 1.00 if the system is encrypted and 0.10 is not; since the effect of not meeting requirements can be viewed more clearly.
Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and estimation metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}. Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:estimationMetric}, we produce the contents of Table~\ref{tbl:calculations} which represents the calculated costs and security risk metric for each encryption scenario {AES256 (MIPS), AES128 (MIPS), None}.
% and how different User Risk Types (URT) also further influence the metric. % and how different User Risk Types (URT) also further influence the metric.


%% Please add the following required packages to your document preamble: %% Please add the following required packages to your document preamble:
Expand All @@ -556,14 +576,14 @@ Taking the calculation of the estimation metric (EM) from Equation~\ref{equ:esti


\begin{table}[] \begin{table}[]
\centering \centering
\label{tbl:calculations}
\begin{tabular}{|c|c|c|c|c|} \begin{tabular}{|c|c|c|c|c|}
\hline \hline
& Design 1 & Design 2 & Design 3 & Design 4 \\ \hline & Design 1 & Design 2 & Design 3 & Design 4 \\ \hline
Costs & 72 & 91 & 88 & 93 \\ \hline Costs & 72 & 91 & 88 & 93 \\ \hline
Estimation Metric & 87.84 & 91 & 88 & 95.73 \\ \hline Security Risk & 15.84 & 0 & 0 & 2 \\ \hline
\end{tabular} \end{tabular}
\caption{Calculated Values for Wireless Transmitter Example (Units USD)} \caption{Calculated Values for Wireless Transmitter Example (Units USD)}
\label{tbl:calculations}
\end{table} \end{table}


Now that a simple example has been shown, allow this paper to now expand the considerations that are made for this simplistic example. The following section will examine further expansion of `estimation metric' considerations, showing how the calculation of comparable metrics can become more involved and complicated. Now that a simple example has been shown, allow this paper to now expand the considerations that are made for this simplistic example. The following section will examine further expansion of `estimation metric' considerations, showing how the calculation of comparable metrics can become more involved and complicated.
Expand Down

0 comments on commit a9688cc

Please sign in to comment.