The Library
Threat modelling guided trust-based task offloading for resource-constrained Internet of Things
Tools
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat modelling guided trust-based task offloading for resource-constrained Internet of Things. Transactions on Sensor Networks, 18 (2). 29. doi:10.1145/3510424 ISSN 1550-4859.
|
PDF
WRAP-threat-modelling-guided-trust-based-task-offloading-resource-constrained-Internet-of-Things-Jhumka-2022.pdf - Published Version - Requires a PDF viewer. Available under License Creative Commons Attribution 4.0. Download (3036Kb) | Preview |
|
PDF
WRAP-threat-modelling-guided-trust-based-task-offloading-resource-constrained-Internet-of-Things-Jhumka-2022.pdf - Accepted Version Embargoed item. Restricted access to Repository staff only - Requires a PDF viewer. Download (1657Kb) |
Official URL: https://doi.org/10.1145/3510424
Abstract
There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource-constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resource-rich edge nodes. Which requires a framework that facilitates the selection of suitable edge nodes to perform task offloading. Therefore, in this paper, we present a novel trust model-driven system architecture, based on behavioural evidence, that is suitable for resource-constrained IoT devices that supports computation offloading. We demonstrate the viability of the proposed architecture with an example deployment of the Beta Reputation System trust model on real hardware to capture node behaviours. The open environment of edge-based IoT networks means that threats against edge nodes can lead to deviation from expected behaviour. Hence, we perform a threat modelling to identify such threats. The proposed system architecture includes threat handling mechanisms that provide security properties such as confidentiality, authentication and non-repudiation of messages in required scenarios and operate within the resource constraints.We evaluate the efficacy of the threat handling mechanisms and identify future work for the standards used.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||
Library of Congress Subject Headings (LCSH): | Internet of things, Computer security, Computer networks -- Security measures, Internet -- Security measures, Data protection, Systems software, Sensor networks, Edge computing | ||||||||
Journal or Publication Title: | Transactions on Sensor Networks | ||||||||
Publisher: | Association of Computing Machinery (ACM) | ||||||||
ISSN: | 1550-4859 | ||||||||
Official Date: | May 2022 | ||||||||
Dates: |
|
||||||||
Volume: | 18 | ||||||||
Number: | 2 | ||||||||
Article Number: | 29 | ||||||||
DOI: | 10.1145/3510424 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Access rights to Published version: | Open Access (Creative Commons) | ||||||||
Date of first compliant deposit: | 10 January 2022 | ||||||||
Date of first compliant Open Access: | 12 January 2022 | ||||||||
RIOXX Funder/Project Grant: |
|
||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year