S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks

被引:45
作者
Javanmardi, Saeed [1 ]
Shojafar, Mohammad [2 ]
Mohammadi, Reza [3 ]
Persico, Valerio [1 ]
Pescape, Antonio [1 ]
机构
[1] Univ Napoli Federico II, Dept Elect Engn & Informat Technol DIETI, Naples, Italy
[2] Univ Surrey, Inst Commun Syst ICS, Guildford, Surrey, England
[3] Bu Ali Sina Univ, Comp Engn Dept, Hamadan, Hamadan, Iran
关键词
IoT-Fog networks; Software-Defined Networking(SDN); Multi-objective optimization; NSGA-III; Fuzzy logic; SOFTWARE-DEFINED NETWORKING; DDOS MITIGATION; INTERNET; THINGS; CLOUD; EDGE; ARCHITECTURE; SIMULATION; TOOLKIT; ATTACKS;
D O I
10.1016/j.jisa.2022.103404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing aims to provide resources to cloud data centers at the network's edge to support time-critical Internet of Things (IoT) applications with low-latency requirements. Protecting the IoT-Fog resources and the scheduling services from the treats is critical for executing the users' requests in the IoT-Fog network. Proper scheduling algorithms are essential to fulfill the requirements of users' applications properly and fully harness the potential of IoT-Fog resources. Software-Defined Networking (SDN) is a structure that decouples the control plane from the data plane, resulting in more flexible management. That eases the implementation of security mechanisms in the IoT-Fog networks. In SDN-based IoT-Fog networks, SDN switches and controllers can serve as fog gateways/cloud gateways. SDN switches and controllers, on the other hand, are more susceptible to a variety of assaults, making the SDN controller a bottleneck and thus easy to control plane saturation. IoT devices are inherently insecure, making the IoT-Fog network vulnerable to a variety of attacks. This paper presents S-FoS, an SDN-based security-aware workflow scheduler for IoT-Fog networks. The proposed approach defends scheduling services against distributed denial of service (DDoS) and port scanning assaults. S-FoS is a joint security and performance optimization approach that uses fuzzy-based anomaly detection algorithms to identify the source of attacks and block malicious requestors. It also uses a NSGA-III multi -objective scheduler optimization approach to consider load balancing and delay simultaneously. We show that the S-FoS outperforms state-of-the-art algorithms in IoT-based scenarios through comprehensive simulations. The experiments indicate that by varying the attack rates, the number of IoT devices, and the number of fog devices, the response time of S-FoS could be improved by 31% and 18%, and the network utilization of S-FoS could be improved by 9% and 4%, respectively, compared to the NSGA-II and MOPSO algorithms.
引用
收藏
页数:15
相关论文
共 67 条
[1]  
Ali I.M., 2020, IEEE TRANS CLOUD COM
[2]   IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum [J].
Alwasel, Khaled ;
Jha, Devki Nandan ;
Habeeb, Fawzy ;
Demirbaga, Umit ;
Rana, Omer ;
Baker, Thar ;
Dustdar, Scharam ;
Villari, Massimo ;
James, Philip ;
Solaiman, Ellis ;
Ranjan, Rajiv .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116
[3]   Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs [J].
Amin, Ruhul ;
Pali, Isha ;
Sureshkumar, Venkatasamy .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[4]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[5]  
[Anonymous], CIC DDOS 2019 DATASE
[6]  
[Anonymous], CISCO KINETIC
[7]  
[Anonymous], XFUZZY
[8]  
Auluck N., 2019, IEEE Transactions on Services Computing
[9]   PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling [J].
Baniata, Hamza ;
Anaqreh, Ahmad ;
Kertesz, Attila .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
[10]   Distributed SDN Control: Survey, Taxonomy, and Challenges [J].
Bannour, Fetia ;
Souihi, Sami ;
Mellouk, Abdelhamid .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :333-354