Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities
- 15 September 2021
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Network
- Vol. 35 (5), 298-305
- https://doi.org/10.1109/mnet.211.2000526
Abstract
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Although it enables offloading latency-sensitive applications at the resource-limited mobile devices, decentralized architectures and diversified deployment environments bring new security and privacy challenges. This is due to the fact that, with wireless communications, the medium can be accessed by both legitimate users and adversaries. Though cloud computing has helped in substantial transformation of global business, it falls short in provisioning distributed services, namely, security of IoT systems. Thus, the ever-evolving IoT applications require robust cyber-security measures particularly at the network's edge, for widespread adoption of IoT applications. In this vein, the classic machine learning models devised during the last decade, fall short in terms of low accuracy and reduced scalability for real-time attack detection across widely dispersed edge nodes. Thus, the advances in areas of deep learning, federated learning, and transfer learning could mark the evolution of more sophisticated models that can detect cyberattacks in heterogeneous IoT-driven edge networks without human intervention. We provide a SecEdge-Learn Architecture that uses deep learning and transfer learning approaches to provided a secure MEC environment. Moreover, we utilized blockchain to store the knowledge gained from the MEC clusters and thereby realizing the transfer learning approach to utilize the knowledge for handling different attack scenarios. Finally, we discuss the industry relevance of the MEC environment.Keywords
Funding Information
- Fonds de Recherche du Québec - Nature et Technologies (287201)
This publication has 13 references indexed in Scilit:
- In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated LearningIEEE Network, 2019
- Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G BeyondIEEE Network, 2019
- Bringing Deep Learning at the Edge of Information-Centric Internet of ThingsIEEE Communications Letters, 2018
- Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of ThingsIEEE Communications Magazine, 2018
- Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device CommunicationsIEEE Wireless Communications, 2018
- Security in Mobile Edge Caching with Reinforcement LearningIEEE Wireless Communications, 2018
- Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things ComputingIEEE Communications Magazine, 2018
- Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open IssuesIEEE Communications Surveys & Tutorials, 2017
- Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and ChallengesIEEE Communications Magazine, 2017
- A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud ComputingIEEE Communications Surveys & Tutorials, 2012