SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of things for smart city applications

被引:74
作者
Alli, Adam A. [1 ,2 ]
Alam, Muhammad Mahbub [2 ]
机构
[1] Islamic Univ Uganda, Mbale, Uganda
[2] Islamic Univ Technol, Gazipur 1704, Bangladesh
关键词
Secure computation offloading; Internet of Things; Fog-Cloud; Neuro-Fuzzy systems; Smart city application; Reinforcement learning; INTERNET; ARCHITECTURE; PERFORMANCE; ALGORITHM; FRAMEWORK; EFFICIENT; NETWORK;
D O I
10.1016/j.iot.2019.100070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computation offloading is one of the important application in Internet of Things (IoT) ecosystem. Computational offloading provides assisted means of processing large amounts of data generated by abundant IoT devices, speed up processing of intensive tasks and save battery life. In this paper, we propose a secure computation offloading scheme in Fog-Cloud-IoT environment (SecOFF-FCIoT). Using machine learning strategies, we accomplish efficient, secure offloading in Fog-IoT setting. In particular, we employ Neuro-Fuzzy Model to secure data at the smart gateway, then the IoT device selects an optimal Fog node to which it can offload its workload using Particle Swarm Optimization(PSO) via the smart gateway. If the fog node is not capable of handling the workload, it is forwarded to the cloud after being classified as either sensitive or non-sensitive. Sensitive data is maintained in private cloud. Whereas non-sensitive data is offloaded using dynamic offloading strategy. In PSO, the availability of fog node is computed using two metrics; i) Available Processing Capacity (APC), and ii) Remaining Node Energy (RNE). Selection of cloud is based on Reinforcement Learning. Our proposed approach is implemented for smart city applications using NS-3 simulator with JAVA Programming. We compare our proposed secure computation offloading model with previous approaches which include DTO-SO, FCFS, LOTEC, and CMS-ACO. Simulation results show that our proposed scheme minimizes latency as compared to selected benchmarks. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:19
相关论文
共 66 条
[1]  
Aazam M, 2014, INT BHURBAN C APPL S, P414, DOI 10.1109/IBCAST.2014.6778179
[2]   Prediction of energetic performance of a building integrated photovoltaic/thermal system thorough artificial neural network and hybrid particle swarm optimization models [J].
Alnaqi, Abdulwahab A. ;
Moayedi, Hossein ;
Shahsavar, Amin ;
Truong Khang Nguyen .
ENERGY CONVERSION AND MANAGEMENT, 2019, 183 :137-148
[3]  
[Anonymous], 2018, Internet of Things (IoT) Top 10 2018.
[4]   Surveying stock market forecasting techniques - Part II: Soft computing methods [J].
Atsalakis, George S. ;
Valavanis, Kimon P. .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) :5932-5941
[5]   Device-Based Security to Improve User Privacy in the Internet of Things [J].
Belem Pacheco, Luis Alberto ;
Pelinson Alchieri, Eduardo Adilio ;
Solis Mendez Barreto, Priscila America .
SENSORS, 2018, 18 (08)
[6]  
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[7]  
Butun I, 2019, I SYMP CONSUM ELECTR
[8]   A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things [J].
Caminha, Jean ;
Perkusich, Angelo ;
Perkusich, Mirko .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[9]   Application of machine learning techniques for supply chain demand forecasting [J].
Carbonneau, Real ;
Laframboise, Kevin ;
Vahidov, Rustam .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 184 (03) :1140-1154
[10]  
Cisco, 20162021 CISC