Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems

被引:13
作者
Feng, Xinzheng [1 ]
Wu, Jun [2 ]
Bashir, Ali Kashif [3 ,4 ]
Li, Jianhua [1 ]
Shen, Ao [5 ]
Alshehri, Mohammad Dahman [6 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai Key Lab Integrated Adm Technol Informat S, Shanghai 200240, Peoples R China
[2] Waseda Univ, Grad Sch Informat Prod & Syst, Fukuoka 8080135, Japan
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, England
[4] Woxsen Univ, Woxsen Sch Business, Hyderabad 502345, India
[5] Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[6] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, Taif, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Task analysis; Trajectory; Access control; Edge computing; Transportation; Processor scheduling; Job shop scheduling; Intelligent transportation system; edge intelligence; trajectory analysis; vulnerability awareness; task scheduling; ACCESS-CONTROL; INTERNET; PRIVACY; SCHEME; THINGS;
D O I
10.1109/TITS.2023.3241479
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In order to fulfill the requirements of Intelligent Transportation Systems (ITS) on ultra-delay service response, task scheduling for trajectory analysis is being shifted from the data center into the network edge of ITS. Such a decentralized paradigm motivates the computing power of the edge device and makes traditional analysis tasks open to the users around ITS. However, since these ITS users have differentiated identities and roles with differentiated security demands and privacy protection, assigning tasks for different users requires identifying and assessing the vulnerability of edge intelligence entities (EIEs). Otherwise, sensitive tasks assigned to the vulnerable EIEs will extremely increase the security risks of industrial control networks. To solve these problems, this paper proposes a vulnerability-aware task scheduling (VATS) mechanism, which integrates vulnerability assessment and access control. With VATS, secure EIEs can obtain more permissions and join in the privacy-sensitive trajectory analysis task, which is essential to enhance privacy protection at edges and ultimately improve the efficiency of task scheduling. The simulation results demonstrate the validity of the proposed scheme to defend insecure task scheduling like trajectory analysis.
引用
收藏
页码:4661 / 4670
页数:10
相关论文
共 36 条
[1]   Dynamic Task Offloading and Scheduling for Low-Latency IoT Services in Multi-Access Edge Computing [J].
Alameddine, Hyame Assem ;
Sharafeddine, Sanaa ;
Sebbah, Samir ;
Ayoubi, Sara ;
Assi, Chadi .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (03) :668-682
[2]   A WOA-Based Optimization Approach for Task Scheduling in Cloud Computing Systems [J].
Chen, Xuan ;
Cheng, Long ;
Liu, Cong ;
Liu, Qingzhi ;
Liu, Jinwei ;
Mao, Ying ;
Murphy, John .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3117-3128
[3]   ABAC and RBAC: Scalable, Flexible, and Auditable Access Management [J].
Coyne, Ed ;
Weil, Timothy R. .
IT PROFESSIONAL, 2013, 15 (03) :14-16
[4]   A Deep Learning Based Explainable Control System for Reconfigurable Networks of Edge Devices [J].
Dassanayake, Priyanthi M. ;
Anjum, Ashiq ;
Bashir, Ali Kashif ;
Bacon, Joseph ;
Saleem, Rabia ;
Manning, Warren .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01) :7-19
[5]   EdgeKE: An On-Demand Deep Learning IoT System for Cognitive Big Data on Industrial Edge Devices [J].
Fang, Weiwei ;
Xue, Feng ;
Ding, Yi ;
Xiong, Naixue ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (09) :6144-6152
[6]   A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles [J].
Garg, Sahil ;
Singh, Amritpal ;
Aujla, Gagangeet Singh ;
Kaur, Sukhdeep ;
Batra, Shalini ;
Kumar, Neeraj .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (06) :3557-3566
[7]   Privacy in the Internet of Things for Smart Healthcare [J].
He, Daojing ;
Ye, Ran ;
Chan, Sammy ;
Guizani, Mohsen ;
Xu, Yanping .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) :38-44
[8]   Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks [J].
He, Daojing ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (01) :389-398
[9]   Social Welfare Maximization in Container-Based Task Scheduling for Parked Vehicle Edge Computing [J].
Huang, Xumin ;
Li, Peichun ;
Yu, Rong .
IEEE COMMUNICATIONS LETTERS, 2019, 23 (08) :1347-1351
[10]   Next-Generation Access Control for Distributed Control Systems [J].
Huh, Jun Ho ;
Bobba, Rakesh B. ;
Markham, Tom ;
Nicol, David M. ;
Hull, Julie ;
Chernoguzov, Alex ;
Khurana, Himanshu ;
Staggs, Kevin ;
Huang, Jingwei .
IEEE INTERNET COMPUTING, 2016, 20 (05) :28-37