Abstract
Edge computing becomes a strategic concept of IoT. The edge computing market reaches several billion USD and grows intensively. In edge computing paradigm, the data can be processed close to, or at the edge of the network. This way greatly reduces the computation and communication load of the network core. Moreover, processing data near the sources of data also provides better support for the user privacy. However, an increase in the number of data processing locations will proportionately increase the attack surface. Due to limited capacities and resources, an edge node cannot perform too many complex operations. Especially for the applications with high real-time requirements, efficiency becomes a crucial issue in secure data analytics. Therefore, it is important to get a tradeoff between security and efficiency. We focus on this problem in this paper.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)
Xiao, Y.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)
Liu, F., Tang, G., Li, Y., Cai, Z., Zhang, X., Zhou, Y.: A survey on edge computing systems and tools. Proc. IEEE 107(8), 1537–1562 (2019)
Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., Sabella, D.: On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun. Surv. Tut. 19(3), 1657–1681 (2017)
Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.: A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tut. 19(4), 2322–2358 (2017)
Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for Internet of Things realization. IEEE Commun. Surv. Tut. 20(4), 2961–2991 (2018)
Yao, H., et al.: Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection. IEEE Networks 33(5), 75–81 (2019)
Lin, F., et al.: Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum. Electron. Mag. 7(6), 45–50 (2018)
Jan, S., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7, 42450–42471 (2019)
Medhi, J.: The evergreen Erlang loss function. OPSEARCH 43(3), 309–319 (2006). https://doi.org/10.1007/BF03398780
Shakhov, V.V.: An efficient method for proportional differentiated admission control implementation. In: Vinel, A., Bellalta, B., Sacchi, C., Lyakhov, A., Telek, M., Oliver, M. (eds.) MACOM 2010. LNCS, vol. 6235, pp. 91–97. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15428-7_10
Acknowledgment
This work was supported by the National Research Foundation of Korea (NRF) grant through the Korean Government (MSIT) under Grant NRF-2020R1I1A1A01065692. The reported study was partially supported by RFBR according to the research project 19-01-00562.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shakhov, V., Sokolova, O., Koo, I. (2020). A Criterion for IDS Deployment on IoT Edge Nodes. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12249. Springer, Cham. https://doi.org/10.1007/978-3-030-58799-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-58799-4_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58798-7
Online ISBN: 978-3-030-58799-4
eBook Packages: Computer ScienceComputer Science (R0)