Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications
Title | Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Halabi, Talal, Abusitta, Adel, Carvalho, Glaucio H.S., Fung, Benjamin C. M. |
Conference Name | 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech) |
Keywords | Fog Computing, human factors, Internet of Things, Internet-scale Computing Security, mechanism design, Metrics, Pervasive computing, Pervasive Computing Security, pubcrawl, Reliability engineering, resilience, Resiliency, Resource management, risk assess-ment, risk management, Scalability, security, security and reliability, Task Analysis |
Abstract | With billions of devices already connected to the network's edge, the Internet of Things (IoT) is shaping the future of pervasive computing. Nonetheless, IoT applications still cannot escape the need for the computing resources available at the fog layer. This becomes challenging since the fog nodes are not necessarily secure nor reliable, which widens even further the IoT threat surface. Moreover, the security risk appetite of heterogeneous IoT applications in different domains or deploy-ment contexts should not be assessed similarly. To respond to this challenge, this paper proposes a new approach to optimize the allocation of secure and reliable fog computing resources among IoT applications with varying security risk level. First, the security and reliability levels of fog nodes are quantitatively evaluated, and a security risk assessment methodology is defined for IoT services. Then, an online, incentive-compatible mechanism is designed to allocate secure fog resources to high-risk IoT offloading requests. Compared to the offline Vickrey auction, the proposed mechanism is computationally efficient and yields an acceptable approximation of the social welfare of IoT devices, allowing to attenuate security risk within the edge network. |
DOI | 10.23919/SpliTech55088.2022.9854374 |
Citation Key | halabi_incentivized_2022 |
- Reliability engineering
- Task Analysis
- security and reliability
- security
- Scalability
- risk management
- risk assess-ment
- resource management
- Resiliency
- resilience
- Internet-scale Computing Security
- pubcrawl
- Pervasive Computing Security
- pervasive computing
- Metrics
- mechanism design
- Internet of Things
- Human Factors
- Fog computing