当前位置: X-MOL 学术IEEE Trans. Ind. Inform. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing
IEEE Transactions on Industrial Informatics ( IF 12.3 ) Pub Date : 2020-11-16 , DOI: 10.1109/tii.2020.3037872
Fazlullah Khan 1 , Mian Ahmad Jan 1 , Ateeq Ur Rehman 1 , Spyridon Mastorakis 2 , Mamoun Alazab 3 , Paul Watter 4
Affiliation  

Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using artificial intelligence within the cyber–physical systems. In the IIoT ecosystem, devices of industrial applications communicate with each other with little human intervention. They need to act intelligently to safeguard the data confidentiality and devices’ authenticity. The ability to gather, process, and store real-time data depends on the quality of data, network connectivity, and processing capabilities of these devices. Pervasive edge computing (PEC) is gaining popularity nowadays due to the resource limitations imposed on the sensor-embedded IIoT devices. PEC processes the gathered data at the network edge to reduce the response time for these devices. However, PEC faces numerous research challenges in terms of secured communication, network connectivity, and resource utilization of the edge servers. To address these challenges, we propose a secured and intelligent communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme, forged identities of adversaries, i.e., Sybil devices, are detected by IIoT devices and shared with edge servers to prevent upstream transmission of their malicious data. Upon Sybil attack detection, each edge server executes a parallel artificial bee colony (pABC) algorithm to perform optimal network configuration of IIoT devices. Each edge server performs the job migration to their neighboring servers for load balancing and better network performance, based on their processing and storage capabilities. The experimental results justify the efficiency of our proposed scheme in terms of Sybil attack detection, the convergence curves of our pABC algorithm, delay, throughput, and control overhead of data communication using PEC for IIoT.

中文翻译:

用于支持 IIoT 的普适边缘计算的安全智能通信方案

工业物联网 (IIoT) 在信息物理系统中使用人工智能确保工业流程之间可靠和高效的数据交换。在 IIoT 生态系统中,工业应用的设备在几乎没有人为干预的情况下相互通信。他们需要采取明智的行动来保护数据的机密性和设备的真实性。收集、处理和存储实时数据的能力取决于这些设备的数据质量、网络连接和处理能力。由于对传感器嵌入式 IIoT 设备施加的资源限制,普及边缘计算 (PEC) 现在越来越受欢迎。PEC 在网络边缘处理收集到的数据,以减少这些设备的响应时间。然而,PEC 在安全通信、网络连接和边缘服务器的资源利用方面面临许多研究挑战。为了应对这些挑战,我们为支持 IIoT 的基础设施中的 PEC 提出了一种安全且智能的通信方案。在所提出的方案中,IIoT 设备检测到对手(即 Sybil 设备)的伪造身份并与边缘服务器共享,以防止其恶意数据的上游传输。在检测到 Sybil 攻击后,每个边缘服务器都会执行并行人工蜂群 (pABC) 算法,以执行 IIoT 设备的最佳网络配置。每个边缘服务器都会根据其处理和存储能力将作业迁移到其相邻服务器,以实现负载平衡和更好的网络性能。
更新日期:2020-11-16
down
wechat
bug