skip to main content
10.1145/3586102.3586124acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Trusted authentication mechanism oriented to network computing offloading at the perception layer

Published:24 July 2023Publication History

ABSTRACT

The current deep integration of the Internet of Things and edge computing has improved the computing capabilities of the perception layer of the Internet of Things. The existing edge computing offloading technology has the problems of lack of a security authentication mechanism and a single problem of solidification of offloading strategies. Based on this, this paper studies the trusted authentication mechanism for the Internet of Things and the optimization scheme of computing offloading. While ensuring the network security of the perception layer of the Internet of Things, according to the changes of the perception layer network, adaptively adjust the computing task offloading strategy for the Internet of Things terminal to improve the operating efficiency of the perception layer of the Internet of Things.

References

  1. Roman R, Lopez J, Mambo M. Mobile edge computing, fog : A survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2018, 78: 680-698.Google ScholarGoogle ScholarCross RefCross Ref
  2. Li H, Ota K, Dong M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing[J]. IEEE Network, 2018, 32(1): 96-101.Google ScholarGoogle ScholarCross RefCross Ref
  3. P.Mach and Z.Becvar, ”Mobile dege computing:A survey on architecture and computation offloading” ,IEEE Communication Surveys Tutorials, vol .19.no.3 .pp. 1628-1656, third quarter 2017.Google ScholarGoogle Scholar
  4. S.H. Islam,G.P. Biswas. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks,Ann.Telecommun.67(11-12)(2012)547-558.Google ScholarGoogle Scholar
  5. M. Min, L. Xiao, Y . Chen, P . Cheng, D. Wu, and W. Zhuang, ‘‘Learning edge computation offloading for IoT devices with energy harvesting,’’IEEE Trans. V eh. Technol., vol. 68, no. 2, pp. 1930–1941, Feb. 2019.Google ScholarGoogle Scholar
  6. T. P . Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y . Tassa, D. Silver,and D. Wierstra, ‘‘Continuous control with deep reinforcement learning,’’Comput. Sci., vol. 8, no. 6, p. A187, 2015.Google ScholarGoogle Scholar
  7. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and itsrole in the Internet of Things,” inProc. MCC Workshop Mobile CloudComput., Helsinki, Finland, 2012, pp. 13–16.Google ScholarGoogle Scholar
  8. I. Stojmenovic and S. Wen, “The fog computing paradigm: Scenariosand security issues,” inProc. Federated Conf. Comput. Sci. Inf. Syst.,Warsaw, Poland, 2014, pp. 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  9. I. Stojmenovic, “Fog computing: A cloud to the ground supportfor smart things and machine-to-machine networks,” inProc. Aust.Telecommun. Netw. Appl. Conf. (ATNAC), 2014, pp. 117–122.Google ScholarGoogle ScholarCross RefCross Ref
  10. [19] T. H. Luanet al.(2016).Fog Computing: Focusing on Mobile Usersat the Edge. [Online]. Available:https://arxiv.org/abs/1502.01815Google ScholarGoogle Scholar
  11. M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, andM. Nemirovsky, “Key ingredients in an IoT recipe: Fog computing,cloud computing, and more fog computing,” inProc. Int. WorkshopComput.-Aided Model. Design Commun. Links Netw. (CAMAD),Athens, Greece, 2014, pp. 325–329.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Trusted authentication mechanism oriented to network computing offloading at the perception layer

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
      December 2022
      241 pages
      ISBN:9781450397520
      DOI:10.1145/3586102

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 July 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format