Abstract
Despite considerable technological advances for smart cities, they still face problems such as instability of cloud server connection, insecurity during data transmission, and slight deficiencies in TCP/IP network architecture. To address such issues, we propose a data-driven intelligence approach to security decisions under Named Data Networking (NDN) architecture for edge computing, taking into consideration factors that impact device entry in smart cities, such as device performance, load, Bluetooth signal strength, and scan frequency. Despite existing techniques for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on entropy weights methods are improved and applied, there exist unstable decision results. Due to this, we propose a technique for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on utility function and entropy weights, named UETOPSIS, where the corresponding utility function is applied according to the influence of each attribute on the decision, ensuring the stability of the ranking of decision results. We rely on an entropy-based weights mechanism to select a suitable master controller for the design of the multi-control protocol in the smart city system, and utilize a utility function to calculate the attribute values and then combine the normalized attribute values of utility numbers, starting by analyzing the main work of the controllers. Lastly, a prototype is developed for performance evaluation purposes. Experimental evaluation and analysis show that the proposed work has better authenticity and reliability than existing works and can reduce the workload of edge computing devices when forwarding data, with stability 24.7% higher than TOPSIS, significantly improving the performance and stability of system fault tolerance and reliability in smart cities, as the second-ranked controller can efficiently take over the work when a central controller fails or damaged.
- Bashaer Alahmri, Saad Al-Ahmadi, and Abdelfettah Belghith. 2021. Efficient pooling and collaborative cache management for NDN/IoT networks. IEEE Access 9(2021), 43228–43240.Google ScholarCross Ref
- Marica Amadeo, Claudia Campolo, Giuseppe Ruggeri, and Antonella Molinaro. 2021. Beyond edge caching: Freshness and popularity aware iot data caching via ndn at internet-scale. IEEE Transactions on Green Communications and Networking 6, 1 (2021), 352–364.Google ScholarCross Ref
- Marica Amadeo, Giuseppe Ruggeri, Claudia Campolo, and Antonella Molinaro. 2019. IoT services allocation at the edge via named data networking: From optimal bounds to practical design. IEEE Transactions on Network and Service Management 16, 2(2019), 661–674.Google ScholarCross Ref
- Supratik Banerjee. 2022. Binary Task Offloading Model For Mobile Edge Computing using NDN Architecture. ADBU Journal of Engineering Technology 11, 1 (2022).Google Scholar
- Jie Cao, Quan Zhang, and Weisong Shi. 2018. Challenges and opportunities in edge computing. Edge Computing: A Primer(2018), 59–70.Google Scholar
- Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang. 2020. Leveraging content connectivity and location awareness for adaptive forwarding in NDN-based mobile ad hoc networks. In Proceedings of the 7th ACM Conference on Information-Centric Networking. 59–69.Google ScholarDigital Library
- Diogo Ferreira de Lima Silva and Adiel Teixeira de Almeida Filho. 2020. Sorting with TOPSIS through boundary and characteristic profiles. Computers & Industrial Engineering 141 (2020), 106328.Google ScholarDigital Library
- Adel Djama, Badis Djamaa, Mustapha Reda Senouci, and Nabil Khemache. 2022. LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks. Annals of Telecommunications 77, 5 (2022), 311–330.Google ScholarCross Ref
- Yujia Fan, Yu Tao, and Yi Zhu. 2020. A Lightweight Verification Mechanism for MPEG-DASH in Named Data Networking. In 2020 3rd International Conference on Hot Information-Centric Networking (HotICN). IEEE, 102–107.Google ScholarCross Ref
- Luís Gameiro, Carlos Senna, and Miguel Luís. 2022. Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments. Future Internet 14, 7 (2022), 196.Google ScholarCross Ref
- Mikael Gasparyan, Torsten Braun, and Eryk Schiller. 2018. IaDRA-SCN: Intra-domain routing architecture for service-centric networking. In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1–6.Google ScholarCross Ref
- Chavoosh Ghasemi, Hamed Yousefi, Kang G Shin, and Beichuan Zhang. 2018. A fast and memory-efficient trie structure for name-based packet forwarding. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 302–312.Google ScholarCross Ref
- Dacheng He, Dafang Zhang, Yanbiao Li, Wei Liang, and Meng-Yen Hsieh. 2021. An efficient and DoS-resilient name lookup for NDN interest forwarding. Connection Science 33, 3 (2021), 735–752.Google ScholarCross Ref
- Jiacheng Hou, Huanzhang Xia, Haoye Lu, and Amiya Nayak. 2021. A GNN-based Approach to Optimize Cache Hit Ratio in NDN Networks. In 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.Google ScholarDigital Library
- Bo Hu, Hongfeng Xie, Yutao Ma, Jian Wang, and Liang-Jie Zhang. 2018. A robust retail POS system based on blockchain and edge computing. In International conference on edge computing. Springer, 99–110.Google ScholarDigital Library
- Atiyeh Javaheri, Seyyed Naser Seyyed Hashemi, and Ali Bohlooli. 2020. Hybrid Naming Scheme Based PURSUIT Architecture for Smart City. In 2020 4th International Conference on Smart City, Internet of Things and Applications (SCIOT). 33–38. https://doi.org/10.1109/SCIOT50840.2020.9250207Google ScholarCross Ref
- Sarantis Kalafatidis, Vassilis Demiroglou, Sotiris Skaperas, Georgios Tsoulouhas, Polychronis Valsamas, Lefteris Mamatas, and Vassilis Tsaoussidis. 2022. Experiments with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments. In 2022 IEEE Symposium on Computers and Communications (ISCC). IEEE, 1–3.Google Scholar
- Ouassim Karrakchou, Nancy Samaan, and Ahmed Karmouch. 2020. Fctrees: A front-coded family of compressed tree-based fib structures for ndn routers. IEEE Transactions on Network and Service Management 17, 2(2020), 1167–1180.Google ScholarDigital Library
- Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, and Adlen Ksentini. 2019. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Communications Surveys & Tutorials 22, 1 (2019), 320–351.Google ScholarDigital Library
- Fatma Kutlu Gündoğdu and Cengiz Kahraman. 2019. Spherical fuzzy sets and spherical fuzzy TOPSIS method. Journal of intelligent & fuzzy systems 36, 1 (2019), 337–352.Google ScholarCross Ref
- Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Han Liu, Arcangelo Castiglione, and Kuan-Ching Li. 2022. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Computing 26, 9 (2022), 4423–4440.Google ScholarDigital Library
- Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, and Shaoyong Guo. 2020. Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity. In International Conference on Artificial Intelligence and Security. Springer, 786–797.Google Scholar
- Yang Li and Tao Yang. 2018. Word embedding for understanding natural language: a survey. In Guide to big data applications. Springer, 83–104.Google Scholar
- Teng Liang, Junxiao Shi, and Beichuan Zhang. 2020. On the prefix granularity problem in NDN adaptive forwarding. In Proceedings of the 7th ACM Conference on Information-Centric Networking. 41–51.Google ScholarDigital Library
- Wei Liang, Songyou Xie, Jiahong Cai, Chong Wang, Yujie Hong, and Xiaoyan Kui. 2021. Novel private data access control scheme suitable for mobile edge computing. China Communications 18, 11 (2021), 92–103.Google ScholarCross Ref
- Spyridon Mastorakis and Abderrahmen Mtibaa. 2019. Towards service discovery and invocation in data-centric edge networks. In 2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 1–6.Google ScholarCross Ref
- Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, and Hassan Mathkour. 2019. Least fresh first cache replacement policy for NDN-based IoT networks. Pervasive and Mobile Computing 52 (2019), 60–70.Google ScholarCross Ref
- Travis Mick, Reza Tourani, and Satyajayant Misra. 2018. LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities. IEEE Internet of Things Journal 5, 2 (2018), 755–764. https://doi.org/10.1109/JIOT.2017.2725238Google ScholarCross Ref
- Muhammad Ali Naeem, Rashid Ali, Byung-Seo Kim, Shahrudin Awang Nor, and Suhaidi Hassan. 2018. A periodic caching strategy solution for the smart city in information-centric Internet of Things. Sustainability 10, 7 (2018), 2576.Google ScholarCross Ref
- Muhammad Ali Naeem, Tu N Nguyen, Rashid Ali, Korhan Cengiz, Yahui Meng, and Tahir Khurshaid. 2021. Hybrid cache management in IoT-based named data networking. IEEE Internet of Things Journal 9, 10 (2021), 7140–7150.Google ScholarCross Ref
- Sabuzima Nayak, Ripon Patgiri, and Angana Borah. 2021. A survey on the roles of Bloom Filter in implementation of the Named Data Networking. Computer Networks 196(2021), 108232.Google ScholarDigital Library
- Miguel Ortiz-Barrios, Chris Nugent, Ian Cleland, Mark Donnelly, and Antanas Verikas. 2020. Selecting the most suitable classification algorithm for supporting assistive technology adoption for people with dementia: a multicriteria framework. Journal of Multi-Criteria Decision Analysis 27, 1-2 (2020), 20–38.Google ScholarCross Ref
- Gopika Premsankar, Mario Di Francesco, and Tarik Taleb. 2018. Edge computing for the Internet of Things: A case study. IEEE Internet of Things Journal 5, 2 (2018), 1275–1284.Google ScholarCross Ref
- Mahmood M Salih, BB Zaidan, and AA Zaidan. 2020. Fuzzy decision by opinion score method. Applied Soft Computing 96 (2020), 106595.Google ScholarDigital Library
- Mahmood M Salih, BB Zaidan, AA Zaidan, and Mohamed A Ahmed. 2019. Survey on fuzzy TOPSIS state-of-the-art between 2007 and 2017. Computers & Operations Research 104 (2019), 207–227.Google ScholarCross Ref
- Klaus Schneider. 2019. Multipath data transport in named data networking. (2019).Google Scholar
- Pradip Kumar Sharma, Mu-Yen Chen, and Jong Hyuk Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. Ieee Access 6(2017), 115–124.Google ScholarCross Ref
- Chi-Sheng Shih, Jyun-Jhe Chou, and Kwei-Jay Lin. 2018. WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings.J. Internet Serv. Inf. Secur. 8, 2 (2018), 1–17.Google Scholar
- HS Shrisha and Uma Boregowda. 2022. An energy efficient and scalable endpoint linked green content caching for Named Data Network based Internet of Things. Results in Engineering 13 (2022), 100345.Google ScholarCross Ref
- Xiaonan Wang and Shaohao Cai. 2020. Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud. Future Generation Computer Systems 112 (2020), 320–329.Google ScholarCross Ref
- Liang Wei, Ning Zuoting, Xie Songyou, Hu Yupeng, Lu Shaofeng, and Zhang Dafang. 2021. Authorization and Consensus Fusion Approach for Blockchain-based Internet of Things. Information Science (2021).Google Scholar
- Yinhao Xiao, Yizhen Jia, Chunchi Liu, Xiuzhen Cheng, Jiguo Yu, and Weifeng Lv. 2019. Edge computing security: State of the art and challenges. Proc. IEEE 107, 8 (2019), 1608–1631.Google ScholarCross Ref
- Xiaolong Xu, Xihua Liu, Zhanyang Xu, Fei Dai, Xuyun Zhang, and Lianyong Qi. 2019. Trust-oriented IoT service placement for smart cities in edge computing. IEEE Internet of Things Journal 7, 5 (2019), 4084–4091.Google ScholarCross Ref
- Zisang Xu, Wei Liang, Kuan-Ching Li, Jianbo Xu, Albert Y Zomaya, and Jixin Zhang. 2021. A Time-sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Transactions on Industrial Informatics(2021).Google Scholar
- Yu Zhang, Zhongda Xia, Alexander Afanasyev, and Lixia Zhang. 2019. A note on routing scalability in named data networking. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1–6.Google ScholarCross Ref
- Xiaokang Zhou, Wei Liang, I Kevin, Kai Wang, Zheng Yan, Laurence T Yang, Wei Wei, Jianhua Ma, and Qun Jin. 2023. Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems. IEEE Wireless Communications 30, 2 (2023), 82–89.Google ScholarDigital Library
- Xiaokang Zhou, Wei Liang, I Kevin, Kai Wang, and Laurence T Yang. 2020. Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations. IEEE Transactions on Computational Social Systems 8, 1 (2020), 171–178.Google ScholarCross Ref
- Xiaokang Zhou, Wei Liang, Ke Yan, Weimin Li, I Kevin, Kai Wang, Jianhua Ma, and Qun Jin. 2022. Edge-enabled two-stage scheduling based on deep reinforcement learning for internet of everything. IEEE Internet of Things Journal 10, 4 (2022), 3295–3304.Google ScholarCross Ref
- Xiaokang Zhou, Xiaozhou Ye, I Kevin, Kai Wang, Wei Liang, Nirmal Kumar C Nair, Shohei Shimizu, Zheng Yan, and Qun Jin. 2023. Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications. IEEE Transactions on Computational Social Systems (2023).Google Scholar
- Xiaokang Zhou, Xiaozhou Ye, I Kevin, Kai Wang, Wei Liang, Nirmal Kumar C Nair, Shohei Shimizu, Zheng Yan, and Qun Jin. 2023. Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications. IEEE Transactions on Computational Social Systems (2023).Google Scholar
- Xiaokang Zhou, Xuzhe Zheng, Xuesong Cui, Jiashuai Shi, Wei Liang, Zheng Yan, Laurance T Yang, Shohei Shimizu, I Kevin, and Kai Wang. 2023. Digital twin enhanced federated reinforcement learning with lightweight knowledge distillation in mobile networks. IEEE Journal on Selected Areas in Communications (2023).Google ScholarDigital Library
- Xiaokang Zhou, Xuzhe Zheng, Tian Shu, Wei Liang, I Kevin, Kai Wang, Lianyong Qi, Shohei Shimizu, and Qun Jin. 2023. Information theoretic learning-enhanced dual-generative adversarial networks with causal representation for robust OOD generalization. IEEE Transactions on Neural Networks and Learning Systems (2023).Google Scholar
Index Terms
- UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities
Recommendations
A novel big data analytics framework for smart cities
AbstractThe emergence of smart cities aims at mitigating the challenges raised due to the continuous urbanization development and increasing population density in cities. To face these challenges, governments and decision makers undertake ...
Fog Computing Applications in Smart Cities: A Systematic Survey
AbstractNowadays, the smart city is a topic that has attracted the attention of many researchers, engineers and even the public because of to its pervasive and vast effect on everyday life. The technologies used to realize the smart cities are often based ...
Smart and Fermented Cities: An Approach to Placemaking in Urban Informatics
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsWhat makes a city meaningful to its residents? What attracts people to live in a city and to care for it? Today, we might see such questions as concerns for HCI, given the emerging agendas of smart and connected cities, IoT, and ubiquitous computing: ...
Comments