Suppr超能文献

一种用于支持工业物联网的普适边缘计算的安全智能通信方案。

A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.

作者信息

Khan Fazlullah, Jan Mian Ahmad, Rehman Ateeq Ur, Mastorakis Spyridon, Alazab Mamoun, Watter Paul

机构信息

Department of Computer Science, Abdul Wali Khan University Mardan, Pakistan.

Computer Science Department, University of Nebraska Omaha, NE, USA 68182-0002.

出版信息

IEEE Trans Industr Inform. 2021 Jul;17(7):5128-5137. doi: 10.1109/tii.2020.3037872. Epub 2020 Nov 16.

Abstract

Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using Artificial Intelligence (AI) within the cyber-physical systems. In the IIoT ecosystem, devices of industrial applications communicate with each other with little human intervention. They need to act intelligently to safeguard the data confidentiality and devices' authenticity. The ability to gather, process, and store real-time data depends on the quality of data, network connectivity, and processing capabilities of these devices. Pervasive Edge Computing (PEC) is gaining popularity nowadays due to the resource limitations imposed on the sensor-embedded IIoT devices. PEC processes the gathered data at the network edge to reduce the response time for these devices. However, PEC faces numerous research challenges in terms of secured communication, network connectivity, and resource utilization of the edge servers. To address these challenges, we propose a secured and intelligent communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme, forged identities of adversaries, i.e., Sybil devices, are detected by IIoT devices and shared with edge servers to prevent upstream transmission of their malicious data. Upon Sybil attack detection, each edge server executes a parallel Artificial Bee Colony (pABC) algorithm to perform optimal network configuration of IIoT devices. Each edge server performs the job migration to their neighboring servers for load balancing and better network performance, based on their processing and storage capabilities. The experimental results justify the efficiency of our proposed scheme in terms of Sybil attack detection, the convergence curves of our pABC algorithm, delay, throughput, and control overhead of data communication using PEC for IIoT.

摘要

工业物联网(IIoT)利用网络物理系统中的人工智能(AI)确保工业流程之间可靠且高效的数据交换。在工业物联网生态系统中,工业应用设备在几乎无需人工干预的情况下相互通信。它们需要智能地行动以保护数据机密性和设备的真实性。收集、处理和存储实时数据的能力取决于这些设备的数据质量、网络连接性和处理能力。由于对嵌入传感器的工业物联网设备施加了资源限制,普适边缘计算(PEC)如今越来越受欢迎。PEC在网络边缘处理收集到的数据,以减少这些设备的响应时间。然而,PEC在安全通信、网络连接性和边缘服务器的资源利用方面面临众多研究挑战。为应对这些挑战,我们提出了一种适用于支持工业物联网的基础设施中的PEC的安全智能通信方案。在所提出的方案中,工业物联网设备检测对手的伪造身份,即女巫设备,并与边缘服务器共享,以防止其恶意数据的上游传输。在检测到女巫攻击后,每个边缘服务器执行并行人工蜂群(pABC)算法,以对工业物联网设备进行最优网络配置。每个边缘服务器根据其处理和存储能力将作业迁移到其相邻服务器,以实现负载均衡并获得更好的网络性能。实验结果证明了我们提出的方案在女巫攻击检测、pABC算法的收敛曲线、延迟、吞吐量以及使用PEC进行工业物联网数据通信的控制开销方面的效率。

相似文献

引用本文的文献

7
: A Computation Reuse Architecture at the Edge.边缘计算的一种计算复用架构。
IEEE Trans Green Commun Netw. 2021 Jun;5(2):765-777. doi: 10.1109/tgcn.2021.3071497. Epub 2021 Apr 7.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验