A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing

被引:3
|
作者
Khan, Fazlullah [1 ,2 ]
Jan, Mian Ahmad [1 ]
Rehman, Ateeq Ur [1 ]
Mastorakis, Spyridon [3 ]
Alazab, Mamoun [4 ]
Watters, Paul [5 ]
机构
[1] Abdul Wali Khan Univ Mardan, Dept Comp Sci, Mardan 23200, Pakistan
[2] Duy Tan Univ, Inst Social & Econ Res, Da Nang 550000, Vietnam
[3] Univ Nebraska, Comp Sci Dept, Omaha, NE 68182 USA
[4] Charles Darwin Univ, Casuarina, NT 0811, Australia
[5] La Trobe Univ Melbourne, Engn & Math Sci Dept, Melbourne, Vic 3086, Australia
关键词
Performance evaluation; Cloud computing; Image edge detection; Servers; Industrial Internet of Things; Edge computing; Convergence; Artificial bee colony (ABC) algorithm; artificial intelligence (AI); industrial Internet of Things (IIoT); pervasive edge computing (PEC); security; SYBIL ATTACKS; ALGORITHM; ABC;
D O I
10.1109/TII.2020.3037872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using artificial intelligence within the cyber-physical systems. In the IIoT ecosystem, devices of industrial applications communicate with each other with little human intervention. They need to act intelligently to safeguard the data confidentiality and devices' authenticity. The ability to gather, process, and store real-time data depends on the quality of data, network connectivity, and processing capabilities of these devices. Pervasive edge computing (PEC) is gaining popularity nowadays due to the resource limitations imposed on the sensor-embedded IIoT devices. PEC processes the gathered data at the network edge to reduce the response time for these devices. However, PEC faces numerous research challenges in terms of secured communication, network connectivity, and resource utilization of the edge servers. To address these challenges, we propose a secured and intelligent communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme, forged identities of adversaries, i.e., Sybil devices, are detected by IIoT devices and shared with edge servers to prevent upstream transmission of their malicious data. Upon Sybil attack detection, each edge server executes a parallel artificial bee colony (pABC) algorithm to perform optimal network configuration of IIoT devices. Each edge server performs the job migration to their neighboring servers for load balancing and better network performance, based on their processing and storage capabilities. The experimental results justify the efficiency of our proposed scheme in terms of Sybil attack detection, the convergence curves of our pABC algorithm, delay, throughput, and control overhead of data communication using PEC for IIoT.
引用
收藏
页码:5128 / 5137
页数:10
相关论文
共 50 条
  • [1] Blockchain Based IIoT Data Sharing Framework for SDN-Enabled Pervasive Edge Computing
    Gao, Ying
    Chen, Yijian
    Hu, Xiping
    Lin, Hongliang
    Liu, Yangliang
    Nie, Laisen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 5041 - 5049
  • [2] A Cost-Effective Key Agreement Encryption Protocol for Securing IIoT-Enabled WSN Communication
    Mahmood, Khalid
    Fatima, Mah Noor
    Shamshad, Salman
    Ghaffar, Zahid
    Das, Ashok Kumar
    Alenazi, Mohammed J. F.
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5185 - 5193
  • [3] Introduction to Intelligent Edge Computing in Pervasive Environments Minitrack
    Juric, Radmila
    Ronchieri, Elisabetta
    Sanfilippo, Filippo
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2024,
  • [4] Efficient Batch Authentication Scheme Based on Edge Computing in IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Gu, Chengjie
    Zhong, Hong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 357 - 368
  • [5] Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (12) : 12921 - 12929
  • [6] IIoT-MEC: A Novel Mobile Edge Computing Framework for 5G-enabled IIoT
    Hou, Xiangwang
    Ren, Zhiyuan
    Yang, Kun
    Chen, Chen
    Zhang, Hailin
    Xiao, Yao
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [7] Blockchain-Enabled Intelligent Vehicular Edge Computing
    Islam, Shafkat
    Badsha, Shahriar
    Sengupta, Shamik
    La, Hung
    Khalil, Ibrahim
    Atiquzzaman, Mohammed
    IEEE NETWORK, 2021, 35 (03): : 125 - 131
  • [8] Intelligent edge and 5G technologies for pervasive computing and communications
    Satheeskumaran, S.
    Zhang Yu-Dong
    Pelusi, Danilo
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2021, 17 (05) : 445 - 446
  • [9] GA-DCTSP: An Intelligent Active Data Processing Scheme for UAV-Enabled Edge Computing
    Bai, Jing
    Huang, Guosheng
    Zhang, Shaobo
    Zeng, Zhiwen
    Liu, Anfeng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4891 - 4906
  • [10] Intelligent edge computing enabled reliable emergency data transmission and energy efficient offloading in 6TiSCH-based IIoT networks
    Rafiq, Ahsan
    Muthanna, Mohammed Saleh Ali
    Muthanna, Ammar
    Alkanhel, Reem
    Abdullah, Wadhah Ahmed Muthanna
    Abd El-Latif, Ahmed A.
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 53