Abstract
With the rapid development of the Internet of Mobile Things (IoMT) and countless mobile devices connected to the Internet, problems of the IoMT computing paradigm, Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC), have been aggravated in terms of network congestion, high energy consumption, and huge investment cost. Dispersed computing utilize geographically distribute computing resources and the “code and data” strategy movement, reducing energy and investment costs and improving the performance of IoMT applications. However, security problems raise as the “code and data” movement among multiple devices. We analyze the security threats in IoMT dispersed computing and propose a secure dispersed computing scheme for IoMT. The proposed scheme improves the availability, integrity, confidentiality, and privacy of IoMT dispersed computing by a decentralized service discovery and distribution model and a security domain-based task offloading scheme. The experiment results prove the effectiveness of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
Baumgart, I., Mies, S.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (2007)
Bhullar, J., Mancilla, A., Nijilar, A., Teixeira: the future of mobile computing in 2025. Technical report (2014)
Dispersed Computing: DARPA-BAA-16-41 1, 1–44 (2016)
Elazhary, H.: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions (2019). https://doi.org/10.1016/j.jnca.2018.10.021
Garcia-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J. Syst. Architect. 91, 83–102 (2018). https://doi.org/10.1016/j.sysarc.2018.05.007
Hu, D., Krishnamachari, B.: Throughput optimized scheduler for dispersed computing systems. In: Proceedings - 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2019 (2019). https://doi.org/10.1109/MobileCloud.2019.00018
Hu, N., Teng, Y., Zhao, Y., Yin, S., Zhao, Y.: IDV: internet domain name verification based on blockchain. CMES-Comput. Model. Eng. Sci. 129(1), 299–322 (2021)
Hu, N., Tian, Z., Du, X., Guizani, M.: An energy-efficient in-network computing paradigm for 6g. IEEE Trans. Green Commun. Netw. 5, 1722–1733 (2021)
Hu, N., Tian, Z., Du, X., Guizani, N., Zhu, Z.: Deep-green: a dispersed energy-efficiency computing paradigm for green industrial IoT. IEEE Trans. Green Commun. Netw. (2021). https://doi.org/10.1109/TGCN.2021.3064683
Hu, N., et al.: Building agile and resilient UAV networks based on SDN and blockchain. IEEE Netw. 35(1), 57–63 (2021)
Hu, N., Yin, S., Su, S., Jia, X., Xiang, Q., Liu, H.: Blockzone: a decentralized and trustworthy data plane for DNS. CMC-Comput. Mater. Continua 65(2), 1531–1557 (2020)
Jia, X., et al.: IRBA: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)
Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled IoT. In: Mobile Information Systems 2020 (2020)
Knezevic, A., et al.: DEMO: CIRCE - a runtime scheduler for DAG-based dispersed computing. In: 2017 2nd ACM/IEEE Symposium on Edge Computing, SEC 2017 (2017). https://doi.org/10.1145/3132211.3132451
König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center for Blockchain: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)
Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of trustzone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)
Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of Android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)
Rahimzadeh, P., et al.: SPARCLE: stream processing applications over dispersed computing networks. In: Proceedings - International Conference on Distributed Computing Systems (2020). https://doi.org/10.1109/ICDCS47774.2020.00112
Schurgot, M.R., Wang, M., Conway, A.E., Greenwald, L.G., Lebling, P.D.: A dispersed computing architecture for resource-centric computation and communication. IEEE Commun. Mag. (2019). https://doi.org/10.1109/MCOM.2019.1800776
Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Da Silva Silva, F.J.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (2015). https://doi.org/10.1109/PERCOMW.2015.7134005
Talegaon, S., Krishnan, R.: Administrative models for role based access control in Android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)
Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020)
Wu, H., et al.: Resolving multi-task competition for constrained resources in dispersed computing: a bilateral matching game. IEEE Internet Things J. (2021). https://doi.org/10.1109/JIOT.2021.3075673
Yang, C.S., Pedarsani, R., Avestimehr, A.S.: Communication-aware scheduling of serial tasks for dispersed computing. IEEE/ACM Trans. Netw. (2019). https://doi.org/10.1109/TNET.2019.2919553
Yang, H., et al.: Dispersed computing for tactical edge in future wars: vision, architecture, and challenges. Wirel. Commun. Mob. Comput. (2021). https://doi.org/10.1155/2021/8899186
Acknowledgments
This work was supported in National Natural Science Foundation of China (Grant No. 61976064), National Defence Science and Technology Key Laboratory Fund (61421190306), Guangzhou Science and Technology Plan Project (202102010471), and Guangdong Province Science and Technology Planning Project (2020A1414010370).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, Y., Hu, N., Zou, J., Zhang, Y. (2022). A Secure Dispersed Computing Scheme for Internet of Mobile Things. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-9576-6_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9575-9
Online ISBN: 978-981-16-9576-6
eBook Packages: Computer ScienceComputer Science (R0)