Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things

Author:

Bradbury Matthew1ORCID,Jhumka Arshad1ORCID,Watson Tim1ORCID,Flores Denys2ORCID,Burton Jonathan3ORCID,Butler Matthew3ORCID

Affiliation:

1. University of Warwick, Lancaster, UK

2. Escuela Politécnica Nacional, Quito, Ecuador

3. Meta Mission Data, Malvern, UK

Abstract

There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resource-rich edge nodes, which requires a framework that facilitates the selection of suitable edge nodes to perform task offloading. Therefore, in this article, we present a novel trust-model-driven system architecture , based on behavioral evidence , that is suitable for resource-constrained IoT devices and supports computation offloading. We demonstrate the viability of the proposed architecture with an example deployment of the Beta Reputation System trust model on real hardware to capture node behaviors. The open environment of edge-based IoT networks means that threats against edge nodes can lead to deviation from expected behavior. Hence, we perform a threat modeling to identify such threats. The proposed system architecture includes threat handling mechanisms that provide security properties such as confidentiality, authentication, and non-repudiation of messages in required scenarios and operate within the resource constraints. We evaluate the efficacy of the threat handling mechanisms and identify future work for the standards used.

Funder

PETRAS National Centre of Excellence for IoT Systems Cybersecurity

EPSRC

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications

Reference83 articles.

1. Introduction to the OCTAVE Approach

2. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks;Alexander Roger;RFC 6550,2012

3. Saqib Ali, Taiseera Al Balushi, Zia Nadir, and Omar Khadeer Hussain. 2018. WSN Security Mechanisms for CPS. Springer International Publishing, 65–87. https://doi.org/10.1007/978-3-319-75880-0_4

4. Christian Amsüss and Maciej Wasilak. 2013–. aiocoap: Python CoAP Library. http://github.com/chrysn/aiocoap/.

5. Modelling cyber-attacks: a survey study

Cited by 16 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3