4 research outputs found

    Green and secure computation offloading for cache-enabled IoT networks

    Get PDF
    The ever-increasing number of diverse and computation-intensive Internet of things (IoT) applications is bringing phenomenal growth in global Internet traffic. Mobile devices with limited resource capacity (i.e., computation and storage resources) and battery lifetime are experiencing technical challenges to satisfy the task requirements. Mobile edge computing (MEC) integrated with IoT applications offloads computation-intensive tasks to the MEC servers at the network edge. This technique shows remarkable potential in reducing energy consumption and delay. Furthermore, caching popular task input data at the edge servers reduces duplicate content transmission, which eventually saves associated energy and time. However, the offloaded tasks are exposed to multiple users and vulnerable to malicious attacks and eavesdropping. Therefore, the assignment of security services to the offloaded tasks is a major requirement to ensure confidentiality and privacy. In this article, we propose a green and secure MEC technique combining caching, cooperative task offloading, and security service assignment for IoT networks. The study not only investigates the synergy between energy and security issues, but also offloads IoT tasks to the edge servers without violating delay requirements. A resource-constrained optimization model is formulated, which minimizes the overall cost combining energy consumption and probable security-breach cost. We also develop a two-stage heuristic algorithm and find an acceptable solution in polynomial time. Simulation results prove that the proposed technique achieves notable improvement over other existing strategies

    An efficient and provably secure authenticated key agreement scheme for mobile edge computing

    Get PDF
    Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more convenience to mobile services over past few years, but security concerns like mutual authentication, user anonymity, user untraceability, etc., have yet remained unresolved. In recent years, many efforts have been made to design security protocols in the context of MCC and MEC, but most of them are prone to security threats. In this paper, we analyze Jia et al.’s scheme, one of the latest authentication protocols for MEC environment and we show this scheme is vulnerable to user impersonation and ephemeral secret leakage attacks. Further, we demonstrate that the aforementioned attacks can be similarly applied to Li et al.’s scheme which recently derived from Jia et al.’s protocol. In this paper, we propose a provably secure authenticated key agreement protocol on the basis of Jia et al.’s scheme that not only withstands security weaknesses of it, but also offers low computational and communicational costs compared to the other related schemes. As a formal security proof, we simulate our scheme with widely used AVISPA tool. Moreover, we show the scalability and practicality of our scheme in a MEC environment through NS-3 simulation

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues

    Security in the Internet of Things Supported by Mobile Edge Computing

    No full text
    corecore