Affiliation:
1. Department of Computer Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
Abstract
With the proliferation of mobile devices and the increasing demand for low-latency and high-throughput applications, mobile edge computing (MEC) has emerged as a promising paradigm to offload computational tasks to the network edge. However, the dynamic and resource-constrained nature of MEC environments introduces new challenges, particularly in the realm of security. In this context, intrusion detection becomes crucial to safeguard the integrity and confidentiality of sensitive data processed at the edge. This paper presents a novel Secured Edge Computing Intrusion Detection System (SEC-IDS) tailored for MEC environments. The proposed SEC-IDS framework integrates both signature-based and anomaly-based detection mechanisms to enhance the accuracy and adaptability of intrusion detection. Leveraging edge computing resources, the framework distributes detection tasks closer to the data source, thereby reducing latency and improving real-time responsiveness. To validate the effectiveness of the proposed SEC-IDS framework, extensive experiments were conducted in a simulated MEC environment. The results demonstrate superior detection rates compared to traditional centralized approaches, highlighting the efficiency and scalability of the proposed solution. Furthermore, the framework exhibits resilience to resource constraints commonly encountered in edge computing environments.
Funder
King Abdulaziz University (DSR) & Ministry of Education
Reference32 articles.
1. Mobile Edge Computing: A Survey;Abbas;IEEE Internet Things J.,2017
2. Rehman, A., Abdullah, S., Fatima, M., Iqbal, M.W., Almarhabi, K.A., Ashraf, M.U., and Ali, S. (2022). Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain. Appl. Sci., 12.
3. Bukhsh, M., Ali, M.S., Alourani, A., Shinan, K., Ashraf, M.U., Jabbar, A., and Chen, W. (2023). Long Short-Term Memory Recurrent Neural Network Approach for Approximating Roots (Eigen Values) of Transcendental Equation of Cantilever Beam. Appl. Sci., 13.
4. Alzubi, O.A., Alzubi, J.A., Alazab, M., Alrabea, A., Awajan, A., and Qiqieh, I. (2022). Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment. Electronics, 11.
5. Ontology Driven Testing Strategies for IoT Applications;Naqvi;Comput. Mater. Contin.,2022