Content Caching in Industrial IoT: Security and Energy Considerations

被引:30
作者
Zahed, M. Ishtiaque Aziz [1 ]
Ahmad, Iftekhar [1 ]
Habibi, Daryoush [1 ]
Quoc Viet Phung [1 ]
机构
[1] Edith Cowan Univ, Sch Engn, Perth, WA 6027, Australia
关键词
Internet of Things; Security; Energy consumption; Optimization; Industries; Monitoring; Green products; Caching; content delivery; energy consumption; Industrial Internet of Things (IIoT); security; TRANSIENT DATA; NETWORKS; INTERNET; COMMUNICATION; FRAMEWORK; THINGS; CLOUD;
D O I
10.1109/JIOT.2019.2948147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Industrial Internet of Things (IIoT), the volume of generated traffic can be high, causing concerns over issues, such as high energy consumption and longer access delay. Caching IIoT content at the network nodes is a promising solution to address these concerns. However, cached IIoT content at the network nodes is vulnerable to malicious attacks, which can cause significant disruptions in industrial operations. In order to monitor and prevent such malicious activities, trusted systems/nodes with supervisory control can be placed at the network nodes. In this article, we introduce the concept of the trusted caching node (TCN) for IIoT. TCNs cache popular IIoT content and ensure robust security to the connected links. This article finds the optimum location for the TCNs and selects secured-routes for content distribution. We formulate a joint optimization problem and minimize the cost related to probable content breach and energy consumption. We also design a low-complexity heuristic algorithm to solve this problem in real-time. The simulation results demonstrate that our proposed solution achieves significant performance gain and ensures secured IIoT content delivery.
引用
收藏
页码:491 / 504
页数:14
相关论文
共 49 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Energy-Aware Data Delivery Framework for Safety-Oriented Mobile IoT [J].
Al-Turjman, Fadi .
IEEE SENSORS JOURNAL, 2018, 18 (01) :470-478
[4]   A Fuzzy Logic Trust Model for Secure Routing in Smart Grid Networks [J].
Alnasser, Aljawharah ;
Sun, Hongjian .
IEEE ACCESS, 2017, 5 :17896-17903
[5]   Blind Network Interdiction Strategies-A Learning Approach [J].
Amuru, Saidhiraj ;
Michael Buehrer, R. ;
Van Der Schaar, Mihaela .
IEEE Transactions on Cognitive Communications and Networking, 2015, 1 (04) :435-449
[6]  
[Anonymous], 2016, IBM ILOG CPLEX OPT S
[7]  
[Anonymous], 2015, EURASIP J WIRELESS C
[8]  
[Anonymous], 1979, Computers and intractability
[9]  
[Anonymous], 2016, online IEEE Spectrum: Technology, Engineering, and Science News
[10]   A note on the complexity of Dijkstra's algorithm for graphs with weighted vertices [J].
Barbehenn, M .
IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (02) :263-263