4 research outputs found
Green and secure computation offloading for cache-enabled IoT networks
The ever-increasing number of diverse and computation-intensive Internet of things (IoT) applications is bringing phenomenal growth in global Internet traffic. Mobile devices with limited resource capacity (i.e., computation and storage resources) and battery lifetime are experiencing technical challenges to satisfy the task requirements. Mobile edge computing (MEC) integrated with IoT applications offloads computation-intensive tasks to the MEC servers at the network edge. This technique shows remarkable potential in reducing energy consumption and delay. Furthermore, caching popular task input data at the edge servers reduces duplicate content transmission, which eventually saves associated energy and time. However, the offloaded tasks are exposed to multiple users and vulnerable to malicious attacks and eavesdropping. Therefore, the assignment of security services to the offloaded tasks is a major requirement to ensure confidentiality and privacy. In this article, we propose a green and secure MEC technique combining caching, cooperative task offloading, and security service assignment for IoT networks. The study not only investigates the synergy between energy and security issues, but also offloads IoT tasks to the edge servers without violating delay requirements. A resource-constrained optimization model is formulated, which minimizes the overall cost combining energy consumption and probable security-breach cost. We also develop a two-stage heuristic algorithm and find an acceptable solution in polynomial time. Simulation results prove that the proposed technique achieves notable improvement over other existing strategies
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Though Mobile Cloud Computing (MCC) and
Mobile Edge Computing (MEC) technologies have brought more
convenience to mobile services over past few years, but security
concerns like mutual authentication, user anonymity, user
untraceability, etc., have yet remained unresolved. In recent years,
many efforts have been made to design security protocols in the
context of MCC and MEC, but most of them are prone to security
threats. In this paper, we analyze Jia et al.’s scheme, one of the
latest authentication protocols for MEC environment and we show
this scheme is vulnerable to user impersonation and ephemeral
secret leakage attacks. Further, we demonstrate that the
aforementioned attacks can be similarly applied to Li et al.’s
scheme which recently derived from Jia et al.’s protocol. In this
paper, we propose a provably secure authenticated key agreement
protocol on the basis of Jia et al.’s scheme that not only withstands
security weaknesses of it, but also offers low computational and
communicational costs compared to the other related schemes. As
a formal security proof, we simulate our scheme with widely used
AVISPA tool. Moreover, we show the scalability and practicality
of our scheme in a MEC environment through NS-3 simulation
Cyber Security and Critical Infrastructures
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues