Abstract
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased latency. The development of IoT extends the computation-intensive applications from centralized servers to the edge of the network, promoting the paradigm of edge computing. Edge computing brings great assistance to IoT architecture by efficiently accomplishing tasks with lower latency, less energy consumption and reduced network bandwidth. Edge-assisted IoT emerges to provide location-aware services and offload computational tasks to edge nodes near the IoT devices. However, a series of security challenges still exist in edge-assisted IoT owing to the inherent vulnerabilities of edge nodes and sensitive nature of the collected data. Among the emerging and existing security schemes in IoT applications, security and energy consumption are two overriding yet conflicting requirements. The tradeoff between security and energy is critical to the sustainability of the IoT ecosystem but still lacks sufficient discussion. In this article, we investigate the security challenges in edge-assisted IoT and how the constraints in energy consumption can affect the design of security schemes. Specifically, we firstly present the architecture of edge-assisted IoT and its unique characteristics. Secondly, we identify the security threats in the edge-assisted IoT applications and the security-energy tradeoff during implementation. Thirdly, in a case study of distributed denial of service (DDoS) and malware injection attack, we propose a preliminary solution to address the conflict between security and energy requirements. Finally, we discuss some open issues and identify future research directions for security and energy efficiency in edge-assisted IoT.
Similar content being viewed by others
References
Ejaz W, Anpalagan A, Imran M A, et al. Internet of Things (IoT) in 5G wireless communications. IEEE Access, 2016, 4: 10310–10314
Zhang K, Ni J, Yang K, et al. Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag, 2017, 55: 122–129
Ni J, Zhang K, Lin X, et al. Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tut, 2018, 20: 601–628
Xiao Y, Jia Y, Liu C, et al. Edge computing security: state of the art and challenges. Proc IEEE, 2019, 107: 1608–1631
Shirazi S N, Gouglidis A, Farshad A, et al. The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Sel Areas Commun, 2017, 35: 2586–2595
Antonakakis M, April T, Bailey M, et al. Understanding the Mirai botnet. In: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), 2017. 1093–1110
Roman R, Lopez J, Mambo M. Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst, 2018, 78: 680–698
Ni J, Lin X, Shen X S. Toward edge-assisted Internet of Things: from security and efficiency perspectives. IEEE Netw, 2019. 33: 50–57
Liu D, Yan Z, Ding W, et al. A survey on secure data analytics in edge computing. IEEE Internet Things J, 2019, 6: 4946–4967
Liu Z, Yin X, Hu Y. CPSS LR-DDoS detection and defense in edge computing utilizing DCNN Q-learning. IEEE Access, 2020, 8: 42120–42130
Xiao L, Xie C, Chen T, et al. A mobile offloading game against smart attacks. IEEE Access, 2016, 4: 2281–2291
Shi C, Liu J, Liu H, et al. Smart user authentication through actuation of daily activities leveraging wifi-enabled iot. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017. 1–10
Hlavacs H, Treutner T, Gelas J P, et al. Energy consumption side-channel attack at virtual machines in a cloud. In: Proceedings of 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, 2011. 605–612
Zhang K, Yang K, Liang X, et al. Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel Commun, 2015, 22: 104–112
Kolias C, Kambourakis G, Stavrou A, et al. DDoS in the IoT: Mirai and other botnets. Computer, 2017, 50: 80–84
Martin M C, Lam M S. Automatic generation of XSS and SQL injection attacks with goal-directed model checking. In: Proceedings of USENIX Security Symposium, 2008. 31–44
Livadas C, Walsh R, Lapsley D, et al. Usilng machine learning technliques to identify botnet traffic. In: Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006. 967–974
Zolotukhin M, Hamalainen T, Kokkonen T, et al. Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In: Proceedings of the 23rd International Conference on Telecommunications (ICT), 2016. 1–6
Niyaz Q, Sun W, Javaid A Y. A deep learning based DDoS detection system in software-defined networking (sdn). 2016. ArXiv: 161107400
Chua Z L, Shen S, Saxena P, et al. Neural nets can learn function type signatures from binaries. In: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), 2017. 99–116
Song W, Yin H, Liu C, et al. Deepmem: learning graph neural network models for fast and robust memory forensic analysis. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018. 606–618
Zuo F, Li X, Young P, et al. Neural machine translation inspired binary code similarity comparison beyond function pairs. 2018. ArXiv: 180804706
Jackson K A, Bennett B T. Locating SQL injection vulnerabilities in java byte code using natural language techniques. In: Proceedings of SoutheastCon 2018, 2018. 1–5
Ross K, Moh M, Moh T S, et al. Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. In: Proceedings of the ACMSE 2018 Conference, 2018. 1–8
Rathore S, Sharma P K, Park J H. XSSClassifier: an efficient XSS attack detection approach based on machine learning classifier on SNSs. J Inf Process Syst, 2017, 13: 1014–1028
Murofushi T, Sugeno M. An interpretation of fuzzy measures and the Choquet integral as an integral with respect to a fuzzy measure. Fuzzy Sets Syst, 1989, 29: 201–227
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shen, S., Zhang, K., Zhou, Y. et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci. China Inf. Sci. 63, 220302 (2020). https://doi.org/10.1007/s11432-019-2906-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2906-y