Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing

Author:

Uslu SuleymanORCID,Kaur DavinderORCID,Durresi Mimoza,Durresi ArjanORCID

Abstract

Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, sensors, and networks that require advanced mitigation strategies and the active monitoring of the system components. Therefore, a paradigm shift is needed, from traditional prevention and detection approaches toward resilience. This study proposes a trust-based defense framework to ensure resilient IoT services on 5G multi-access edge computing (MEC) systems. This defense framework is based on the trustability metric, which is an extension of the concept of reliability and measures how much a system can be trusted to keep a given level of performance under a specific successful attack vector. Furthermore, trustability is used as a trade-off with system cost to measure the net utility of the system. Systems using multiple sensors with different levels of redundancy were tested, and the framework was shown to measure the trustability of the entire system. Furthermore, different types of attacks were simulated on an edge cloud with multiple nodes, and the trustability was compared to the capabilities of dynamic node addition for the redundancy and removal of untrusted nodes. Finally, the defense framework measured the net utility of the service, comparing the two types of edge clouds with and without the node deactivation capability. Overall, the proposed defense framework based on trustability ensures a satisfactory level of resilience for IoT on 5G MEC systems, which serves as a trade-off with an accepted cost of redundant resources under various attacks.

Funder

National Science Foundation

U.S. Department of Agriculture (USDA), National Institute of Food and Agriculture

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference54 articles.

1. A view of cloud computing;Armbrust;Commun. ACM,2010

2. A survey of mobile cloud computing: Architecture, applications, and approaches;Dinh;Wirel. Commun. Mob. Comput.,2013

3. Krutz, R.L., and Vines, R.D. (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley Publishing.

4. Beyond lightning: A survey on security challenges in cloud computing;Rong;Comput. Electr. Eng.,2013

5. Pearson, S. (2013). Privacy and Security for Cloud Computing, Springer.

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IoT cybersecurity in 5G and beyond: a systematic literature review;International Journal of Information Security;2024-05-28

2. A Trustworthy and Responsible Decision-Making Framework for Resource Management in Food-Energy-Water Nexus: A Control-Theoretical Approach;ACM Transactions on Intelligent Systems and Technology;2024-04-23

3. LLM-Based Agents Utilized in a Trustworthy Artificial Conscience Model for Controlling AI in Medical Applications;Lecture Notes on Data Engineering and Communications Technologies;2024

4. Causal Inference to Enhance AI Trustworthiness in Environmental Decision-Making;Lecture Notes on Data Engineering and Communications Technologies;2024

5. Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New Parameter;Lecture Notes on Data Engineering and Communications Technologies;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3