Skip to main content

A Secure Dispersed Computing Scheme for Internet of Mobile Things

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2021)

Abstract

With the rapid development of the Internet of Mobile Things (IoMT) and countless mobile devices connected to the Internet, problems of the IoMT computing paradigm, Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC), have been aggravated in terms of network congestion, high energy consumption, and huge investment cost. Dispersed computing utilize geographically distribute computing resources and the “code and data” strategy movement, reducing energy and investment costs and improving the performance of IoMT applications. However, security problems raise as the “code and data” movement among multiple devices. We analyze the security threats in IoMT dispersed computing and propose a secure dispersed computing scheme for IoMT. The proposed scheme improves the availability, integrity, confidentiality, and privacy of IoMT dispersed computing by a decentralized service discovery and distribution model and a security domain-based task offloading scheme. The experiment results prove the effectiveness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)

    Google Scholar 

  2. Baumgart, I., Mies, S.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (2007)

    Google Scholar 

  3. Bhullar, J., Mancilla, A., Nijilar, A., Teixeira: the future of mobile computing in 2025. Technical report (2014)

    Google Scholar 

  4. Dispersed Computing: DARPA-BAA-16-41 1, 1–44 (2016)

    Google Scholar 

  5. Elazhary, H.: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions (2019). https://doi.org/10.1016/j.jnca.2018.10.021

  6. Garcia-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J. Syst. Architect. 91, 83–102 (2018). https://doi.org/10.1016/j.sysarc.2018.05.007

    Article  Google Scholar 

  7. Hu, D., Krishnamachari, B.: Throughput optimized scheduler for dispersed computing systems. In: Proceedings - 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2019 (2019). https://doi.org/10.1109/MobileCloud.2019.00018

  8. Hu, N., Teng, Y., Zhao, Y., Yin, S., Zhao, Y.: IDV: internet domain name verification based on blockchain. CMES-Comput. Model. Eng. Sci. 129(1), 299–322 (2021)

    Google Scholar 

  9. Hu, N., Tian, Z., Du, X., Guizani, M.: An energy-efficient in-network computing paradigm for 6g. IEEE Trans. Green Commun. Netw. 5, 1722–1733 (2021)

    Article  Google Scholar 

  10. Hu, N., Tian, Z., Du, X., Guizani, N., Zhu, Z.: Deep-green: a dispersed energy-efficiency computing paradigm for green industrial IoT. IEEE Trans. Green Commun. Netw. (2021). https://doi.org/10.1109/TGCN.2021.3064683

  11. Hu, N., et al.: Building agile and resilient UAV networks based on SDN and blockchain. IEEE Netw. 35(1), 57–63 (2021)

    Article  Google Scholar 

  12. Hu, N., Yin, S., Su, S., Jia, X., Xiang, Q., Liu, H.: Blockzone: a decentralized and trustworthy data plane for DNS. CMC-Comput. Mater. Continua 65(2), 1531–1557 (2020)

    Article  Google Scholar 

  13. Jia, X., et al.: IRBA: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)

    Article  Google Scholar 

  14. Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled IoT. In: Mobile Information Systems 2020 (2020)

    Google Scholar 

  15. Knezevic, A., et al.: DEMO: CIRCE - a runtime scheduler for DAG-based dispersed computing. In: 2017 2nd ACM/IEEE Symposium on Edge Computing, SEC 2017 (2017). https://doi.org/10.1145/3132211.3132451

  16. König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center for Blockchain: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)

    Google Scholar 

  17. Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of trustzone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)

    Google Scholar 

  18. Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of Android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)

    Google Scholar 

  19. Rahimzadeh, P., et al.: SPARCLE: stream processing applications over dispersed computing networks. In: Proceedings - International Conference on Distributed Computing Systems (2020). https://doi.org/10.1109/ICDCS47774.2020.00112

  20. Schurgot, M.R., Wang, M., Conway, A.E., Greenwald, L.G., Lebling, P.D.: A dispersed computing architecture for resource-centric computation and communication. IEEE Commun. Mag. (2019). https://doi.org/10.1109/MCOM.2019.1800776

  21. Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Da Silva Silva, F.J.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (2015). https://doi.org/10.1109/PERCOMW.2015.7134005

  22. Talegaon, S., Krishnan, R.: Administrative models for role based access control in Android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)

    Google Scholar 

  23. Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020)

    Google Scholar 

  24. Wu, H., et al.: Resolving multi-task competition for constrained resources in dispersed computing: a bilateral matching game. IEEE Internet Things J. (2021). https://doi.org/10.1109/JIOT.2021.3075673

  25. Yang, C.S., Pedarsani, R., Avestimehr, A.S.: Communication-aware scheduling of serial tasks for dispersed computing. IEEE/ACM Trans. Netw. (2019). https://doi.org/10.1109/TNET.2019.2919553

  26. Yang, H., et al.: Dispersed computing for tactical edge in future wars: vision, architecture, and challenges. Wirel. Commun. Mob. Comput. (2021). https://doi.org/10.1155/2021/8899186

Download references

Acknowledgments

This work was supported in National Natural Science Foundation of China (Grant No. 61976064), National Defence Science and Technology Key Laboratory Fund (61421190306), Guangzhou Science and Technology Plan Project (202102010471), and Guangdong Province Science and Technology Planning Project (2020A1414010370).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ning Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Y., Hu, N., Zou, J., Zhang, Y. (2022). A Secure Dispersed Computing Scheme for Internet of Mobile Things. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9576-6_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9575-9

  • Online ISBN: 978-981-16-9576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics