Toward Secure and Lightweight Data Transmission for Cloud-Edge-Terminal Collaboration in Artificial Intelligence of Things

被引:16
作者
Fang, Weidong [1 ,2 ,3 ]
Zhu, Chunsheng [4 ]
Zhang, Wuxiong [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 200051, Peoples R China
[2] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[4] Southern Univ Sci & Technol, Inst Future Networks, Shenzhen, Guangdong, Peoples R China
关键词
Security; Collaboration; Pollution; Network coding; Cloud computing; Internet of Things; Data models; cloud-edge-terminal collaboration enabled artificial intelligence of things (CETC-AIoT); eavesdropping attack; network coding; pollution attack; security; NETWORK; SCHEME; ATTACK;
D O I
10.1109/JIOT.2023.3295438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of data sources in cloud-edge-terminal collaboration enabled artificial intelligence of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal side directly impact on the modeling and decision-making for CETC-AIoT. However, due to openness of transmission media among cloud, edge and terminal, it could be vulnerable to pollution attack and eavesdropping attack. Additionally, the constrained resources of some terminals make it difficult to deploy strong security schemes. In this context, how to make a tradeoff between the requirement of security and the limitation of resources needs to be explored. Therefore, toward secure and lightweight data transmission for CETC-AIoT, we propose a novel Gold sequence-based secure network coding (GS-SNC) scheme in this article. Specifically, the Gold sequence is introduced to generate the pseudo-random sequence, which is used to scramble and descramble the original information. The precoding matrix is constructed to encode and decode the scrambled information. The intermediate nodes perform the random linear network coding. The simulation results show that GS-SNC has advantages compared with double prime numbers-based secure network coding (DP-SNC) and secure practical network coding (SPOC), in terms of security, computational complexity, encryption capacity, and space overhead.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 33 条
  • [1] Anh L., 2010, INT SYMP NETW CO, P1
  • [2] Modeling and Analysis of Eavesdropping Attack in 802.11 ad mmWave Wireless Networks
    Balakrishnan, Sarankumar
    Wang, Pu
    Bhuyan, Arupjyoti
    Sun, Zhi
    [J]. IEEE ACCESS, 2019, 7 : 70355 - 70370
  • [3] Bhattad K., 2005, PROC WORKSHOP NETW, P281
  • [4] Theory of Secure Network Coding
    Cai, Ning
    Chan, Terence
    [J]. PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 421 - 437
  • [5] Secure Network Coding on a Wiretap Network
    Cai, Ning
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 424 - 435
  • [6] Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
    Cheng, Chi
    Lee, Jemin
    Jiang, Tao
    Takagi, Tsuyoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 993 - 1002
  • [7] Optimal Control of Chilled Water System With Ensemble Learning and Cloud Edge Terminal Implementation
    Deng, Shijun
    Chen, Zhiwen
    Kuang, Fuhua
    Yang, Chunhua
    Gui, Weihua
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) : 7839 - 7848
  • [8] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639
  • [9] A Low Complexity Secure Network Coding in Wireless Sensor Network
    Fang, Weidong
    Shan, Lianhai
    Jia, Guoqing
    Ji, Xiaohong
    Chen, Shanji
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (05): : 905 - 913