STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT
【Author】 Zhang, Peiying; Jiang, Chunxiao; Pang, Xue; Qian, Yi
【Source】IEEE INTERNET OF THINGS JOURNAL
【影响因子】10.238
【Abstract】To a large extent, the deployment of edge computing (EC) can reduce the burden of the explosive growth of the Internet of Things. As a powerful hub between the Internet of Things and cloud servers, edge devices make the transmission of cloud to things no longer complicated. However, edge nodes are faced with a series of problems, such as a large number, a wide range of distribution, and complex environment, the security of EC should not be underestimated. Based on this, we propose a tactic to improve the safety of EC by virtualizing edge nodes. In detail, first of all, we propose a strategy of edge node partition, virtualize the edge nodes dealing with different types of things into various virtual networks, which are deployed between the edge nodes and the cloud server. Second, considering that different information transmission has different security requirement, we propose a security tactic based on security level measurement. Finally, through simulation experiments, we compare with the existing advanced algorithms which are committed to virtual network security, and prove that the model proposed in this article has definite progressiveness in enhancing the security of edge computing.
【Keywords】Security; Cloud computing; Internet of Things; Edge computing; Virtualization; Servers; Computational modeling; Edge computing; Internet of Things; network virtualization (NV); security tactic; virtual network embedding (VNE)
【发表时间】2021 44607
【收录时间】2022-01-02
【文献类型】
【主题类别】
--
评论