A Criterion for IDS Deployment on IoT Edge Nodes

被引:1
作者
Shakhov, Vladimir [1 ]
Sokolova, Olga [2 ]
Koo, Insoo [1 ]
机构
[1] Univ Ulsan, Ulsan 44610, South Korea
[2] Inst Computat Math & Math Geophys, Novosibirsk, Russia
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT I | 2020年 / 12249卷
基金
新加坡国家研究基金会;
关键词
Edge computing; Internet of Things; Intrusion Detection System; Quantitative analysis; Queuing theory; INTRUSION-DETECTION SYSTEM; SECURITY; INTERNET;
D O I
10.1007/978-3-030-58799-4_40
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Edge computing becomes a strategic concept of IoT. The edge computing market reaches several billion USD and grows intensively. In edge computing paradigm, the data can be processed close to, or at the edge of the network. This way greatly reduces the computation and communication load of the network core. Moreover, processing data near the sources of data also provides better support for the user privacy. However, an increase in the number of data processing locations will proportionately increase the attack surface. Due to limited capacities and resources, an edge node cannot perform too many complex operations. Especially for the applications with high real-time requirements, efficiency becomes a crucial issue in secure data analytics. Therefore, it is important to get a tradeoff between security and efficiency. We focus on this problem in this paper.
引用
收藏
页码:546 / 556
页数:11
相关论文
共 11 条
[1]   Toward a Lightweight Intrusion Detection System for the Internet of Things [J].
Jan, Sana Ullah ;
Ahmed, Saeed ;
Shakhov, Vladimir ;
Koo, Insoo .
IEEE ACCESS, 2019, 7 :42450-42471
[2]   Fair Resource Allocation in an Intrusion-Detection System for Edge Computing Ensuring the security of Internet of Things devices [J].
Lin, Fuhong ;
Zhou, Yutong ;
An, Xingsuo ;
You, Ilsun ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (06) :45-50
[3]   A Survey on Edge Computing Systems and Tools [J].
Liu, Fang ;
Tang, Guoming ;
Li, Youhuizi ;
Cai, Zhiping ;
Zhang, Xingzhou ;
Zhou, Tongqing .
PROCEEDINGS OF THE IEEE, 2019, 107 (08) :1537-1562
[4]   A Survey on Mobile Edge Computing: The Communication Perspective [J].
Mao, Yuyi ;
You, Changsheng ;
Zhang, Jun ;
Huang, Kaibin ;
Letaief, Khaled B. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2322-2358
[5]  
Medhi J., 2006, Opsearch, V43, P309
[6]   Survey on Multi-Access Edge Computing for Internet of Things Realization [J].
Porambage, Pawani ;
Okwuibe, Jude ;
Liyanage, Madhusanka ;
Ylianttila, Mika ;
Taleb, Tarik .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :2961-2991
[7]  
Shakhov VV, 2010, LECT NOTES COMPUT SC, V6235, P91, DOI 10.1007/978-3-642-15428-7_10
[8]   On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration [J].
Taleb, Tarik ;
Samdanis, Konstantinos ;
Mada, Badr ;
Flinck, Hannu ;
Dutta, Sunny ;
Sabella, Dario .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03) :1657-1681
[9]  
Xiao Y, 2019, 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), P203, DOI [10.1109/dsc47296.2019.8937659, 10.1109/JPROC.2019.2918437]
[10]   Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection [J].
Yao, Haipeng ;
Gao, Pengcheng ;
Zhang, Peiying ;
Wang, Jingjing ;
Jiang, Chunxiao ;
Lu, Lijun .
IEEE NETWORK, 2019, 33 (05) :75-81