Javascript must be enabled to continue!
Secure Computing for Fog-Enabled Industrial IoT
View through CrossRef
Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame. For faster execution, these tasks are offloaded to nearby fog nodes. Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks. Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities. This results in an increased delay of task computation for trustworthy nodes. To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks. However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame. To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes. EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame. Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities. Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network. The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes.
Title: Secure Computing for Fog-Enabled Industrial IoT
Description:
Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications.
This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame.
For faster execution, these tasks are offloaded to nearby fog nodes.
Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks.
Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities.
This results in an increased delay of task computation for trustworthy nodes.
To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks.
However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame.
To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes.
EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame.
Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities.
Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network.
The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes.
Related Results
Dense Fog Burst Reinforcement over Eastern China
Dense Fog Burst Reinforcement over Eastern China
<p>Fog can be hazardous weather. Dense and polluted fog is especially known to impact transportation, air quality, and public health. Low visibilities on fog days thr...
A Study of Moving from Cloud Computing to Fog Computing
A Study of Moving from Cloud Computing to Fog Computing
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capa...
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
<p>By reducing the atmospheric visibility, fog events have strong impacts on several humans activities. Transport security, military operations, air quality forecast ...
Load Balancing at Fog Nodes using Scheduling Algorithms
Load Balancing at Fog Nodes using Scheduling Algorithms
Cloud Computing proves to be most predominant innovative field in the area of Information technology. Cloud is best suited for small scale to large scale businesses and personal pu...
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Low visibility caused by fog events can lead to disruption of every type of public transportation, and even loss of life. The focus of this study is the synoptic conditions associa...
Fog climatology at Shanghai Pudong International Airport
Fog climatology at Shanghai Pudong International Airport
AbstractUsing 22‐year ground observations on meteorological variables, we conducted a statistical analysis to reveal fog characteristics at Shanghai Pudong International Airport (S...
Edge/Fog Computing Networks
Edge/Fog Computing Networks
AbstractAs a main driver of 5G, the future mobile network is going to create a hyper‐connected Internet of Everything (IoE) world which requires the network to be scalable, versati...
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
PurposeTrust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud comp...

