SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

被引:0
|
作者
Ye, Jiehao [1 ]
Cheng, Wen [1 ]
Liu, Xiaolong [1 ]
Zhu, Wenyi [1 ]
Wu, Xuan'ang [1 ]
Shen, Shigen [1 ]
机构
[1] Huzhou Univ, Sch Informat Engn, Huzhou 313000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 02期
关键词
Edge computing; Internet of Things; malicious software; propagation model; heterogeneity; PROPAGATION MODEL; SPREADING MODEL; DYNAMICS; TRANSMISSION; STRATEGIES;
D O I
10.32604/cmc.2024.049985
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing -enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise data confidentiality and network service availability. Facing this situation, we put forward an epidemiology -based susceptible -curb -infectious -removed -dead (SCIRD) model. Then, we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations. Additionally, we establish the presence of equilibrium states in the SCIRD model. Furthermore, we conduct an analysis of the model's stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing -enabled IoT (ECIoT) networks. Lastly, we validate the efficacy and superiority of the SCIRD model through MATLAB simulations. These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks. The experimental results indicate that the theoretical SCIRD model has instructive significance, deeply revealing the principles of malicious software propagation in ECIoT networks. This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold, which lays the foundation for building more secure and reliable ECIoT networks.
引用
收藏
页码:2743 / 2769
页数:27
相关论文
共 50 条
  • [1] Mobile Edge Computing-Enabled Heterogeneous Networks
    Park, Chanwon
    Lee, Jemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (02) : 1038 - 1051
  • [2] Edge Computing-enabled Body Area Networks
    Aloi, Gianluca
    Fortino, Giancarlo
    Gravina, Raffaele
    Pace, Pasquale
    Caliciuri, Giuseppe
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 349 - 353
  • [3] Optimizing Information Freshness in Computing-Enabled IoT Networks
    Xu, Chao
    Yang, Howard H.
    Wang, Xijun
    Quek, Tony Q. S.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02): : 971 - 985
  • [4] Energy and Time-Effective Computation Offloading for Edge Computing-Enabled IoT Networks
    Al Aidaros, Othman
    Kardjadja, Youcef
    Bouida, Zied
    Ibnkahla, Mohamed
    2023 IEEE SENSORS APPLICATIONS SYMPOSIUM, SAS, 2023,
  • [5] Service Caching For Edge Computing-Enabled Heterogeneous Networks
    Kim, Mingun
    Cho, Hewon
    Lee, Jemin
    Hong, Seung-Eun
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1039 - 1041
  • [6] An Edge Computing-Enabled Decentralized Authentication Scheme for Vehicular Networks
    Wang, Qianpeng
    Gao, Deyun
    Foh, Chuan Heng
    Leung, Victor C. M.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] A Robust Optimization Approach for Resource Allocation in Edge Computing-enabled NetworksA Robust Optimization Approach for Resource Allocation in Edge Computing-enabled Networks
    Cheng, Yuxia
    Liang, Chengchao
    Chen, Qianbin
    Yu, F. Richard
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [8] Joint Service Caching and Computing Resource Allocation for Edge Computing-Enabled Networks
    Kim, Mingun
    Cho, Hewon
    Cui, Ying
    Lee, Jemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9029 - 9044
  • [9] Proactive caching for edge computing-enabled industrial mobile wireless networks
    Li, Xiaomin
    Wan, Jiafu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 89 - 97
  • [10] A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
    Zhang, Shiqiang
    Cao, Dongzhi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05): : 6778 - 6808