TY - JOUR
T1 - A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing
AU - Khan, Fazlullah
AU - Jan, Mian Ahmad
AU - Rehman, Ateeq Ur
AU - Mastorakis, Spyridon
AU - Alazab, Mamoun
AU - Watters, Paul
N1 - Funding Information:
This work was supported in part by a Pilot Award from the Center for Research in Human Movement Variability, in part by the NIH under Award P20GM109090, and in part by a Planning Award from the Collaboration Initiative of the University of Nebraska System.
Publisher Copyright:
© 2005-2012 IEEE.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2021/7
Y1 - 2021/7
N2 - Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using artificial intelligence within the cyber-physical systems. In the IIoT ecosystem, devices of industrial applications communicate with each other with little human intervention. They need to act intelligently to safeguard the data confidentiality and devices' authenticity. The ability to gather, process, and store real-time data depends on the quality of data, network connectivity, and processing capabilities of these devices. Pervasive edge computing (PEC) is gaining popularity nowadays due to the resource limitations imposed on the sensor-embedded IIoT devices. PEC processes the gathered data at the network edge to reduce the response time for these devices. However, PEC faces numerous research challenges in terms of secured communication, network connectivity, and resource utilization of the edge servers. To address these challenges, we propose a secured and intelligent communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme, forged identities of adversaries, i.e., Sybil devices, are detected by IIoT devices and shared with edge servers to prevent upstream transmission of their malicious data. Upon Sybil attack detection, each edge server executes a parallel artificial bee colony (pABC) algorithm to perform optimal network configuration of IIoT devices. Each edge server performs the job migration to their neighboring servers for load balancing and better network performance, based on their processing and storage capabilities. The experimental results justify the efficiency of our proposed scheme in terms of Sybil attack detection, the convergence curves of our pABC algorithm, delay, throughput, and control overhead of data communication using PEC for IIoT.
AB - Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using artificial intelligence within the cyber-physical systems. In the IIoT ecosystem, devices of industrial applications communicate with each other with little human intervention. They need to act intelligently to safeguard the data confidentiality and devices' authenticity. The ability to gather, process, and store real-time data depends on the quality of data, network connectivity, and processing capabilities of these devices. Pervasive edge computing (PEC) is gaining popularity nowadays due to the resource limitations imposed on the sensor-embedded IIoT devices. PEC processes the gathered data at the network edge to reduce the response time for these devices. However, PEC faces numerous research challenges in terms of secured communication, network connectivity, and resource utilization of the edge servers. To address these challenges, we propose a secured and intelligent communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme, forged identities of adversaries, i.e., Sybil devices, are detected by IIoT devices and shared with edge servers to prevent upstream transmission of their malicious data. Upon Sybil attack detection, each edge server executes a parallel artificial bee colony (pABC) algorithm to perform optimal network configuration of IIoT devices. Each edge server performs the job migration to their neighboring servers for load balancing and better network performance, based on their processing and storage capabilities. The experimental results justify the efficiency of our proposed scheme in terms of Sybil attack detection, the convergence curves of our pABC algorithm, delay, throughput, and control overhead of data communication using PEC for IIoT.
KW - Artificial bee colony (ABC) algorithm
KW - artificial intelligence (AI)
KW - industrial Internet of Things (IIoT)
KW - pervasive edge computing (PEC)
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85104204675&partnerID=8YFLogxK
U2 - 10.1109/TII.2020.3037872
DO - 10.1109/TII.2020.3037872
M3 - Article
C2 - 33994885
AN - SCOPUS:85104204675
SN - 1551-3203
VL - 17
SP - 5128
EP - 5137
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 7
M1 - 9259232
ER -