skip to main content
10.1145/3448734.3450781acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdtmisConference Proceedingsconference-collections
research-article

A Situational Awareness Model for Edge Computing Devices

Published: 17 May 2021 Publication History

Abstract

Edge computing is now widely applied in industrial IoT to enable fast response and resolution of services for end-user applications in the interconnected world of things. However, edge computing devices are highly vulnerable to attacks due to their proximity to ends with large amounts of private user information and rich digital assets. The purpose of this paper is to propose a situational awareness approach for edge computing devices to protect the security of edge devices. An example is implemented, and the results show that the situational awareness model can accurately detect the attacks encountered by edge devices.

References

[1]
R. Want, B. Schilit and S. Jenson, “Enabling the Internet of Thing”, IEEE Comput., vol. 48, no. 1, pp. 28-35, Jan. 2015.
[2]
S. Chen, “Internet of Things Based Smart Grids Supported by Intelligent Edge Computing,” in IEEE Access, vol. 7, pp. 74089-74102, 2019.
[3]
H. El-Sayed, “Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment,” IEEE Access, vol. 6, pp. 1706-1717, 2018.
[4]
B. Ji, Y. Li, B. Zhou, C. Li, K. Song and H. Wen, “Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting,” in IEEE Access, vol. 7, pp. 38738-38747, 2019
[5]
L. Hu, “Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things,” in IEEE Internet of Things Journal, vol. 5, no. 1, pp. 219-228, Feb. 2018.
[6]
R. P. Kumar and S. Smys,“A novel report on architecture, protocols and applications in Internet of Things (IoT),” in Proc. 2nd ICISC, Coimbatore, 2018, pp. 1156-1161.
[7]
Y. Xie, H. Wen, B. Wu, Y. Jiang and J. Meng, “A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing,” in IEEE Transactions on Cloud Computing, vol. 7, no. 2, pp. 383-391, 2019.
[8]
H. Wen, S. Li, X. Zhu and L. Zhou, “A framework of the PHY-layer approach to defense against security threats in cognitive radio networks,” in IEEE Network, vol. 27, no. 3, pp. 34-39, May-June 2013.
[9]
H. Wen, J Tang, J Wu, H Song and T Wu, “A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT),” in IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 119-126, 2015.
[10]
P. Sornsuwit and S. Jaiyen, “Intrusion detection model based on ensemble learning for U2R and R2L attacks,” in Proc. 7th ICITEE, Chiang Mai, 2015, pp. 354-359.
[11]
Q. Yan, W. Huang, X. Luo, Q. Gong and F. R. Yu, “A multi-level DDoS mitigation framework for the industrial Internet of Things,” IEEE Commun. Mag., vol. 56, no. 2, pp. 30-36, Feb. 2018.
[12]
O. P. Samantray, S. N. Tripathy and S. K. Das, “A study to understand malware behavior through malware analysis,” in Proc. IEEE ICSCAN, Pondicherry, India, 2019, pp. 1-5
[13]
R. Liao, H.Wen, J Wu, H Song and F Pan. “The Rayleigh Fading Channel Prediction via Deep Learning,” Wireless Communications and Mobile Computing 2018(2018):1-11,2018.
[14]
X. Jia, D. He, N. Kumar and K. R. Choo, “A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing,” IEEE Systems J., vol. 14, no. 1, pp. 560-571, March 2020.
[15]
F. Wang, Dingde Jiang, Hong Wen and Houbing Song. “Adaboost-based security level classification of mobile intelligent terminals.” Journal of Supercomputing,vol. 75, no. 11, pp. 7460–7478, 2019.
[16]
P. Zhang, X. Han, D. Zhang, K. Qian and S. Xiong, “A security situation awareness system based on wide & deep,” in Proc. 5th IEEE CCIS, Nanjing, China, 2018, pp. 107-111.
[17]
J. Li, X. Yi and S. Wei, “A study of network security situational awareness in Internet of Things,” International Wireless Commun. and Mobile Comput., Limassol, Cyprus, 2020, pp. 1624-1629.
[18]
L. Hu, H. Li, Z. Wei, S. Dong and Z. Zhang, “Summary of research on IT network and industrial control network security assessment,” in Proc. 3rd IEEE ITNEC, Chengdu, China, 2019, pp. 1203-1210.

Index Terms

  1. A Situational Awareness Model for Edge Computing Devices
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CONF-CDS 2021: The 2nd International Conference on Computing and Data Science
    January 2021
    1142 pages
    ISBN:9781450389570
    DOI:10.1145/3448734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Edge computing
    2. complex networks
    3. detect attacks
    4. security
    5. situational awareness

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CONF-CDS 2021

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 42
      Total Downloads
    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media