ABSTRACT
The current deep integration of the Internet of Things and edge computing has improved the computing capabilities of the perception layer of the Internet of Things. The existing edge computing offloading technology has the problems of lack of a security authentication mechanism and a single problem of solidification of offloading strategies. Based on this, this paper studies the trusted authentication mechanism for the Internet of Things and the optimization scheme of computing offloading. While ensuring the network security of the perception layer of the Internet of Things, according to the changes of the perception layer network, adaptively adjust the computing task offloading strategy for the Internet of Things terminal to improve the operating efficiency of the perception layer of the Internet of Things.
- Roman R, Lopez J, Mambo M. Mobile edge computing, fog : A survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2018, 78: 680-698.Google ScholarCross Ref
- Li H, Ota K, Dong M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing[J]. IEEE Network, 2018, 32(1): 96-101.Google ScholarCross Ref
- P.Mach and Z.Becvar, ”Mobile dege computing:A survey on architecture and computation offloading” ,IEEE Communication Surveys Tutorials, vol .19.no.3 .pp. 1628-1656, third quarter 2017.Google Scholar
- S.H. Islam,G.P. Biswas. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks,Ann.Telecommun.67(11-12)(2012)547-558.Google Scholar
- M. Min, L. Xiao, Y . Chen, P . Cheng, D. Wu, and W. Zhuang, ‘‘Learning edge computation offloading for IoT devices with energy harvesting,’’IEEE Trans. V eh. Technol., vol. 68, no. 2, pp. 1930–1941, Feb. 2019.Google Scholar
- T. P . Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y . Tassa, D. Silver,and D. Wierstra, ‘‘Continuous control with deep reinforcement learning,’’Comput. Sci., vol. 8, no. 6, p. A187, 2015.Google Scholar
- F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and itsrole in the Internet of Things,” inProc. MCC Workshop Mobile CloudComput., Helsinki, Finland, 2012, pp. 13–16.Google Scholar
- I. Stojmenovic and S. Wen, “The fog computing paradigm: Scenariosand security issues,” inProc. Federated Conf. Comput. Sci. Inf. Syst.,Warsaw, Poland, 2014, pp. 1–8.Google ScholarCross Ref
- I. Stojmenovic, “Fog computing: A cloud to the ground supportfor smart things and machine-to-machine networks,” inProc. Aust.Telecommun. Netw. Appl. Conf. (ATNAC), 2014, pp. 117–122.Google ScholarCross Ref
- [19] T. H. Luanet al.(2016).Fog Computing: Focusing on Mobile Usersat the Edge. [Online]. Available:https://arxiv.org/abs/1502.01815Google Scholar
- M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, andM. Nemirovsky, “Key ingredients in an IoT recipe: Fog computing,cloud computing, and more fog computing,” inProc. Int. WorkshopComput.-Aided Model. Design Commun. Links Netw. (CAMAD),Athens, Greece, 2014, pp. 325–329.Google ScholarCross Ref
Index Terms
- Trusted authentication mechanism oriented to network computing offloading at the perception layer
Recommendations
Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing
ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network SecurityIoT routing is the basis for efficient operation of perception layer networks. The current routing technology of IoT lacks a trusted authentication mechanism, and the adopted traditional routing algorithm can hardly meet the routing demand of massive ...
Perception layer security in Internet of Things
AbstractInternet of Things (IoT) is one of the rising innovations of the current era that has largely attracted both the industry and the academia. Life without the IoT is entirely indispensable. To dispel the doubts, if any, about the ...
Highlights- WSNs, RFID and RSN are the key enabling technologies of IoT.
- Security at ...
An Authentication Model for IoT Clouds
ASONAM '15: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015Nowadays, the combination between Cloud computing and Internet of Things (IoT) is pursuing new levels of efficiency in delivering services, representing a tempting business opportunity for IT operators of increasing their revenues. However, security is ...
Comments