A Robust Security Task Offloading in Industrial IoT-Enabled Distributed Multi-Access Edge Computing

被引:9
作者
Gyamfi, Eric [1 ]
Jurcut, Anca [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
来源
FRONTIERS IN SIGNAL PROCESSING | 2022年 / 2卷
关键词
internet of things; iot-edge; task offloading; multi-access edge computing; time-synchronization; latency; security task offloading; ENERGY;
D O I
10.3389/frsip.2022.788943
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid increase in the Industrial Internet of Things (IIoT) use cases plays a significant role in Industry 4.0 development. However, IIoT systems face resource constraints problems and are vulnerable to cyberattacks due to their inability to implement existing sophisticated security systems. One way of alleviating these resource constraints is to utilize multi-access edge computing (MEC) to provide computational resources at the network edge to execute the security applications. To provide resilient security for IIoT using MEC, the offloading latency, synchronization time, and turnaround time must be optimized to provide real-time attack detection. Hence, this paper provides a novel adaptive machine learning-based security (MLS) task offloading (ASTO) mechanism to ensure that the connectivity between the MEC server and IIoT is secured and guaranteed. We explored the trade-off between the limited computing capacity and high cloud computing latency to propose an ASTO, where MEC and IIoT can collaborate to provide optimized MLS to protect the network. In the proposed system, we converted the MLS task offloading and synchronization problem into an equivalent mathematical model, which can be solved by applying Markov transition probability and clock offset estimation using maximum likelihood. Our extensive simulations show that the proposed algorithm provides robust security for the IIoT network with low latency, synchronization accuracy, and energy efficiency.
引用
收藏
页数:13
相关论文
共 24 条
[1]  
Akherfi Khadija, 2018, Applied Computing and Informatics, V14, P1, DOI 10.1016/j.aci.2016.11.002
[2]   A Novel Reliable Adaptive Beacon Time Synchronization Algorithm for Large-Scale Vehicular Ad Hoc Networks [J].
Ansere, James Adu ;
Han, Guangjie ;
Wang, Hao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) :11565-11576
[3]  
Bakhshi Z, 2018, IEEE WIREL COMMUNN, P173, DOI 10.1109/WCNCW.2018.8368997
[4]  
Bing L., 2019, ZTE Commun, V15, P19, DOI DOI 10.3969/J.ISSN.1673-5188.2017.02.003
[5]   ThriftyEdge: Resource-Efficient Edge Computing for Intelligent IoT Applications [J].
Chen, Xu ;
Shi, Qian ;
Yang, Lei ;
Xu, Jie .
IEEE NETWORK, 2018, 32 (01) :61-65
[6]   Energy Efficient Dynamic Offloading in Mobile Edge Computing for Internet of Things [J].
Chen, Ying ;
Zhang, Ning ;
Zhang, Yongchao ;
Chen, Xin ;
Wu, Wen ;
Shen, Xuemin .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) :1050-1060
[7]  
Doan TV, 2019, 2019 IEEE 2ND 5G WORLD FORUM (5GWF), P46, DOI [10.1109/5GWF.2019.8911715, 10.1109/5gwf.2019.8911715]
[8]  
Finnerty K., 2018, Cyber Security Breaches Survey 2018: Statistical Release
[9]   A Coverage-Aware Hierarchical Charging Algorithm in Wireless Rechargeable Sensor Networks [J].
Han, Guangjie ;
Yang, Xuan ;
Liu, Li ;
Chan, Sammy ;
Zhang, Wenbo .
IEEE NETWORK, 2019, 33 (04) :201-207
[10]  
Hsu CW, 2019, EUR CONF NETW COMMUN, P384, DOI [10.1109/EuCNC.2019.8802020, 10.1109/eucnc.2019.8802020]