Skip to main content

A Criterion for IDS Deployment on IoT Edge Nodes

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12249))

Abstract

Edge computing becomes a strategic concept of IoT. The edge computing market reaches several billion USD and grows intensively. In edge computing paradigm, the data can be processed close to, or at the edge of the network. This way greatly reduces the computation and communication load of the network core. Moreover, processing data near the sources of data also provides better support for the user privacy. However, an increase in the number of data processing locations will proportionately increase the attack surface. Due to limited capacities and resources, an edge node cannot perform too many complex operations. Especially for the applications with high real-time requirements, efficiency becomes a crucial issue in secure data analytics. Therefore, it is important to get a tradeoff between security and efficiency. We focus on this problem in this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)

    Article  Google Scholar 

  2. Xiao, Y.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)

    Article  Google Scholar 

  3. Liu, F., Tang, G., Li, Y., Cai, Z., Zhang, X., Zhou, Y.: A survey on edge computing systems and tools. Proc. IEEE 107(8), 1537–1562 (2019)

    Article  Google Scholar 

  4. Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., Sabella, D.: On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun. Surv. Tut. 19(3), 1657–1681 (2017)

    Article  Google Scholar 

  5. Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.: A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tut. 19(4), 2322–2358 (2017)

    Article  Google Scholar 

  6. Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for Internet of Things realization. IEEE Commun. Surv. Tut. 20(4), 2961–2991 (2018)

    Article  Google Scholar 

  7. Yao, H., et al.: Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection. IEEE Networks 33(5), 75–81 (2019)

    Article  Google Scholar 

  8. Lin, F., et al.: Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum. Electron. Mag. 7(6), 45–50 (2018)

    Article  Google Scholar 

  9. Jan, S., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7, 42450–42471 (2019)

    Article  Google Scholar 

  10. Medhi, J.: The evergreen Erlang loss function. OPSEARCH 43(3), 309–319 (2006). https://doi.org/10.1007/BF03398780

    Article  MATH  Google Scholar 

  11. Shakhov, V.V.: An efficient method for proportional differentiated admission control implementation. In: Vinel, A., Bellalta, B., Sacchi, C., Lyakhov, A., Telek, M., Oliver, M. (eds.) MACOM 2010. LNCS, vol. 6235, pp. 91–97. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15428-7_10

    Chapter  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Research Foundation of Korea (NRF) grant through the Korean Government (MSIT) under Grant NRF-2020R1I1A1A01065692. The reported study was partially supported by RFBR according to the research project 19-01-00562.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Shakhov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shakhov, V., Sokolova, O., Koo, I. (2020). A Criterion for IDS Deployment on IoT Edge Nodes. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12249. Springer, Cham. https://doi.org/10.1007/978-3-030-58799-4_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58799-4_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58798-7

  • Online ISBN: 978-3-030-58799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics