A survey of edge computing-based designs for IoT security

Digital Communications and Networks - Tập 6 - Trang 195-202 - 2020
Kewei Sha1, T. Andrew Yang1, Wei Wei1, Sadegh Davari1
1Department of Computing Sciences, University of Houston-Clear Lake, Houston, 77058, USA

Tài liệu tham khảo

Gubbi, 2013, Internet of things (iot): a vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29, 1645, 10.1016/j.future.2013.01.010 Lin, 2017, A survey on internet of things: architecture, enabling technologies, security and privacy, and applications, IIEEE Internet Things (IoT) J., 99 Sha, 2018, On security challenges and open issues in internet of things, Future Gener. Comput. Syst., 83, 326, 10.1016/j.future.2018.01.059 Brewster Russon Sha, 2016, Security in internet of things: opportunities and challenges Alramadhan, 2017, An overview of access control mechanisms for internet of things Chen, 2018, Efficient ring signature and group signature schemes based on q-ary identification protocols, Comput. J., 61, 545, 10.1093/comjnl/bxx112 Wang, 2013, Slight homomorphic signature for access controlling in cloud computing, Wirel. Pers. Commun., 73, 51, 10.1007/s11277-012-0977-8 Shi, 2016, Edge computing: vision and challenges, IEEE Internet. Things J., 3, 637, 10.1109/JIOT.2016.2579198 P. Mach, Z. Becvar, Mobile Edge Computing: A Survey on Architecture and Computation Offloading, arXiv preprint arXiv:1702.05309. Errabelly, 2017, Edgesec: design of an edge layer security service to enhance internet of things security Montero, 2016, Offloading personal security applications to the network edge: a mobile user case scenario Hsu, 2018, Reconfigurable security: edge-computing-based framework for iot, IEEE Network, 32, 92, 10.1109/MNET.2018.1700284 Tao, 2017, Performance guaranteed computation offloading for mobile-edge cloud computing, IEEE Wireless Commun. Lett., 6, 774, 10.1109/LWC.2017.2740927 Hu, 2014, Flowguard: building robust firewalls for software-defined networks Roman, 2018, Immune system for the internet of things using edge technologies, IEEE Internet. Things J., 1 Haddadi, 2018, Siotome: an edge-isp collaborative architecture for iot security Ali, 2018, Edge-centric multimodal authentication system using encrypted biometric templates, Future Gener. Comput. Syst., 85, 76, 10.1016/j.future.2018.02.040 Lu, 2017, A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot, IEEE Access, 5, 3302, 10.1109/ACCESS.2017.2677520 Du, 2018, Big data privacy preserving in multi-access edge computing for heterogeneous internet of things, IEEE Commun. Mag., 56, 62, 10.1109/MCOM.2018.1701148 Singh, 2017, Rt-sane: real time security aware scheduling on the network edge Portal Lin, 2017, On data integrity attacks against route guidance in transportation-based cyber-physical systems Singh, 2014, A survey of internet-of-things: future vision, architecture, challenges and services Chen, 2016, Efficient multi-user computation offloading for mobile-edge cloud computing, IEEE/ACM Trans. Netw., 2795, 10.1109/TNET.2015.2487344 Lee, 2015, The internet of things (iot): applications, investments, and challenges for enterprises, Bus. Horiz., 58, 431, 10.1016/j.bushor.2015.03.008 Sha, 2017, A secure and efficient framework to read isolated smart grid devices, IEEE Trans. on Smart Grid, 8, 2519, 10.1109/TSG.2016.2526045 Montero, 2015, Virtualized security at the network edge: a user-centric approach, IEEE Commun. Mag., 53, 176, 10.1109/MCOM.2015.7081092 Mukherjee, 2017, Calyam End-to-end iot security middleware for cloud-fog communication project Basile, 2010, Ontology-based security policy translation, J. Inf. Assur. Secur., 5, 437 Goldman, 2006, Linking remote attestation to secure tunnel endpoints Markham, 2001, Security at the network edge: a distributed firewall architecture Kazemian, 2012, Header space analysis: static checking for networks Reitblatt, 2012, Abstractions for network update, Comput. Commun. Rev., 42, 323, 10.1145/2377677.2377748 Yaseen, 2016, A fog computing based system for selective forwarding detection in mobile wireless sensor networks Nunes, 2013, Virtualized network isolation using software defined networks Wilhoit Kolias, 2017, Ddos in the iot: mirai and other botnets, Computer, 50, 80, 10.1109/MC.2017.201 Dasgupta, 2017, Multi-factor authentication, 185 Sha, 2014, One-time symmetric key based cloud supported secure smart meter reading Fan, 2012, Eslras: a lightweight rfid authentication scheme with high efficiency and strong security for internet of things Gope, 2018, Lightweight and privacy-preserving rfid authentication scheme for distributed iot infrastructure with secure localization services for smart city environment, Future Gener. Comput. Syst., 83, 629, 10.1016/j.future.2017.06.023 Dwork, 2014, The algorithmic foundations of differential privacy, Found. Trends® Theor. Comput. Sci., 9, 211 Sweeney, 2002, A model for protecting privacy, Int. J. Uncertain. Fuzziness Knowledge-Based Syst., 10, 557, 10.1142/S0218488502001648 Xi, 2007, Enforcing privacy using symmetric key-set in vehicular networks Sha, 2006, Adaptive privacy-preserving authentication in vehicular networks Gentry, 2009 Pei, 1996 McSherry, 2007, Mechanism design via differential privacy Razeghi, 2018, Privacy-preserving outsourced media search using secure sparse ternary codes Sharma, 2017, Privategraph: a cloud-centric system for spectral analysis of large encrypted graphs Loheswaran, 2016, Renaissance system model improving security and third party auditing in cloud computing, Wirel. Pers. Commun., 90, 1051, 10.1007/s11277-016-3296-7 Sommer, 2010, Outside the closed world: on using machine learning for network intrusion detection, 305 Buczak, 2016, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Commun. Surv. Tutor., 18, 1153, 10.1109/COMST.2015.2494502 Yin, 2017, A deep learning approach for intrusion detection using recurrent neural networks, Ieee Access, 5, 21954, 10.1109/ACCESS.2017.2762418 Shone, 2018, A deep learning approach to network intrusion detection, IEEE Trans. Emerg. Top. Comput. Intell., 2, 41, 10.1109/TETCI.2017.2772792 Sha, 2015, Data quality challenges in cyber-physical systems, J. Data Inf. Qual. (JDIQ), 6, 8 Sha, 2010, Rd4: role-differentiated cooperative deceptive data detection and filtering in vanets, IEEE Trans. Veh. Technol., 59, 1183, 10.1109/TVT.2010.2040400 Weber, 2016, Cybersecurity in the internet of things: legal aspects, Comput. Law Secur. Rep., 32, 715, 10.1016/j.clsr.2016.07.002 Sha, 2017, Patient identification based on wrist activity data Tsai, 2012, Threat as a service?: virtualization’s impact on cloud security, IT professional, 14, 32, 10.1109/MITP.2011.117 Eldefrawy, 2017, Fusing hybrid remote attestation with a formally verified microkernel: lessons learned