Skip to main content

2022 | OriginalPaper | Buchkapitel

A Secure Dispersed Computing Scheme for Internet of Mobile Things

verfasst von : Yan Zhao, Ning Hu, Jincai Zou, Yuqiang Zhang

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of the Internet of Mobile Things (IoMT) and countless mobile devices connected to the Internet, problems of the IoMT computing paradigm, Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC), have been aggravated in terms of network congestion, high energy consumption, and huge investment cost. Dispersed computing utilize geographically distribute computing resources and the “code and data” strategy movement, reducing energy and investment costs and improving the performance of IoMT applications. However, security problems raise as the “code and data” movement among multiple devices. We analyze the security threats in IoMT dispersed computing and propose a secure dispersed computing scheme for IoMT. The proposed scheme improves the availability, integrity, confidentiality, and privacy of IoMT dispersed computing by a decentralized service discovery and distribution model and a security domain-based task offloading scheme. The experiment results prove the effectiveness of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
2.
Zurück zum Zitat Baumgart, I., Mies, S.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (2007) Baumgart, I., Mies, S.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (2007)
3.
Zurück zum Zitat Bhullar, J., Mancilla, A., Nijilar, A., Teixeira: the future of mobile computing in 2025. Technical report (2014) Bhullar, J., Mancilla, A., Nijilar, A., Teixeira: the future of mobile computing in 2025. Technical report (2014)
4.
Zurück zum Zitat Dispersed Computing: DARPA-BAA-16-41 1, 1–44 (2016) Dispersed Computing: DARPA-BAA-16-41 1, 1–44 (2016)
8.
Zurück zum Zitat Hu, N., Teng, Y., Zhao, Y., Yin, S., Zhao, Y.: IDV: internet domain name verification based on blockchain. CMES-Comput. Model. Eng. Sci. 129(1), 299–322 (2021) Hu, N., Teng, Y., Zhao, Y., Yin, S., Zhao, Y.: IDV: internet domain name verification based on blockchain. CMES-Comput. Model. Eng. Sci. 129(1), 299–322 (2021)
9.
Zurück zum Zitat Hu, N., Tian, Z., Du, X., Guizani, M.: An energy-efficient in-network computing paradigm for 6g. IEEE Trans. Green Commun. Netw. 5, 1722–1733 (2021)CrossRef Hu, N., Tian, Z., Du, X., Guizani, M.: An energy-efficient in-network computing paradigm for 6g. IEEE Trans. Green Commun. Netw. 5, 1722–1733 (2021)CrossRef
11.
Zurück zum Zitat Hu, N., et al.: Building agile and resilient UAV networks based on SDN and blockchain. IEEE Netw. 35(1), 57–63 (2021)CrossRef Hu, N., et al.: Building agile and resilient UAV networks based on SDN and blockchain. IEEE Netw. 35(1), 57–63 (2021)CrossRef
12.
Zurück zum Zitat Hu, N., Yin, S., Su, S., Jia, X., Xiang, Q., Liu, H.: Blockzone: a decentralized and trustworthy data plane for DNS. CMC-Comput. Mater. Continua 65(2), 1531–1557 (2020)CrossRef Hu, N., Yin, S., Su, S., Jia, X., Xiang, Q., Liu, H.: Blockzone: a decentralized and trustworthy data plane for DNS. CMC-Comput. Mater. Continua 65(2), 1531–1557 (2020)CrossRef
13.
Zurück zum Zitat Jia, X., et al.: IRBA: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)CrossRef Jia, X., et al.: IRBA: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)CrossRef
14.
Zurück zum Zitat Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled IoT. In: Mobile Information Systems 2020 (2020) Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled IoT. In: Mobile Information Systems 2020 (2020)
16.
Zurück zum Zitat König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center for Blockchain: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020) König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center for Blockchain: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110–127 (2020)
17.
Zurück zum Zitat Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of trustzone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020) Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of trustzone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1–15 (2020)
18.
Zurück zum Zitat Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of Android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020) Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of Android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)
21.
Zurück zum Zitat Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Da Silva Silva, F.J.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (2015). https://doi.org/10.1109/PERCOMW.2015.7134005 Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Da Silva Silva, F.J.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (2015). https://​doi.​org/​10.​1109/​PERCOMW.​2015.​7134005
22.
Zurück zum Zitat Talegaon, S., Krishnan, R.: Administrative models for role based access control in Android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020) Talegaon, S., Krishnan, R.: Administrative models for role based access control in Android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)
23.
Zurück zum Zitat Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020) Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16–30 (2020)
Metadaten
Titel
A Secure Dispersed Computing Scheme for Internet of Mobile Things
verfasst von
Yan Zhao
Ning Hu
Jincai Zou
Yuqiang Zhang
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_6

Premium Partner