skip to main content
research-article
Free Access
Just Accepted

UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities

Authors Info & Claims
Online AM:14 February 2024Publication History
Skip Abstract Section

Abstract

Despite considerable technological advances for smart cities, they still face problems such as instability of cloud server connection, insecurity during data transmission, and slight deficiencies in TCP/IP network architecture. To address such issues, we propose a data-driven intelligence approach to security decisions under Named Data Networking (NDN) architecture for edge computing, taking into consideration factors that impact device entry in smart cities, such as device performance, load, Bluetooth signal strength, and scan frequency. Despite existing techniques for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on entropy weights methods are improved and applied, there exist unstable decision results. Due to this, we propose a technique for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on utility function and entropy weights, named UETOPSIS, where the corresponding utility function is applied according to the influence of each attribute on the decision, ensuring the stability of the ranking of decision results. We rely on an entropy-based weights mechanism to select a suitable master controller for the design of the multi-control protocol in the smart city system, and utilize a utility function to calculate the attribute values and then combine the normalized attribute values of utility numbers, starting by analyzing the main work of the controllers. Lastly, a prototype is developed for performance evaluation purposes. Experimental evaluation and analysis show that the proposed work has better authenticity and reliability than existing works and can reduce the workload of edge computing devices when forwarding data, with stability 24.7% higher than TOPSIS, significantly improving the performance and stability of system fault tolerance and reliability in smart cities, as the second-ranked controller can efficiently take over the work when a central controller fails or damaged.

References

  1. Bashaer Alahmri, Saad Al-Ahmadi, and Abdelfettah Belghith. 2021. Efficient pooling and collaborative cache management for NDN/IoT networks. IEEE Access 9(2021), 43228–43240.Google ScholarGoogle ScholarCross RefCross Ref
  2. Marica Amadeo, Claudia Campolo, Giuseppe Ruggeri, and Antonella Molinaro. 2021. Beyond edge caching: Freshness and popularity aware iot data caching via ndn at internet-scale. IEEE Transactions on Green Communications and Networking 6, 1 (2021), 352–364.Google ScholarGoogle ScholarCross RefCross Ref
  3. Marica Amadeo, Giuseppe Ruggeri, Claudia Campolo, and Antonella Molinaro. 2019. IoT services allocation at the edge via named data networking: From optimal bounds to practical design. IEEE Transactions on Network and Service Management 16, 2(2019), 661–674.Google ScholarGoogle ScholarCross RefCross Ref
  4. Supratik Banerjee. 2022. Binary Task Offloading Model For Mobile Edge Computing using NDN Architecture. ADBU Journal of Engineering Technology 11, 1 (2022).Google ScholarGoogle Scholar
  5. Jie Cao, Quan Zhang, and Weisong Shi. 2018. Challenges and opportunities in edge computing. Edge Computing: A Primer(2018), 59–70.Google ScholarGoogle Scholar
  6. Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang. 2020. Leveraging content connectivity and location awareness for adaptive forwarding in NDN-based mobile ad hoc networks. In Proceedings of the 7th ACM Conference on Information-Centric Networking. 59–69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Diogo Ferreira de Lima Silva and Adiel Teixeira de Almeida Filho. 2020. Sorting with TOPSIS through boundary and characteristic profiles. Computers & Industrial Engineering 141 (2020), 106328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Adel Djama, Badis Djamaa, Mustapha Reda Senouci, and Nabil Khemache. 2022. LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks. Annals of Telecommunications 77, 5 (2022), 311–330.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yujia Fan, Yu Tao, and Yi Zhu. 2020. A Lightweight Verification Mechanism for MPEG-DASH in Named Data Networking. In 2020 3rd International Conference on Hot Information-Centric Networking (HotICN). IEEE, 102–107.Google ScholarGoogle ScholarCross RefCross Ref
  10. Luís Gameiro, Carlos Senna, and Miguel Luís. 2022. Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments. Future Internet 14, 7 (2022), 196.Google ScholarGoogle ScholarCross RefCross Ref
  11. Mikael Gasparyan, Torsten Braun, and Eryk Schiller. 2018. IaDRA-SCN: Intra-domain routing architecture for service-centric networking. In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Chavoosh Ghasemi, Hamed Yousefi, Kang G Shin, and Beichuan Zhang. 2018. A fast and memory-efficient trie structure for name-based packet forwarding. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 302–312.Google ScholarGoogle ScholarCross RefCross Ref
  13. Dacheng He, Dafang Zhang, Yanbiao Li, Wei Liang, and Meng-Yen Hsieh. 2021. An efficient and DoS-resilient name lookup for NDN interest forwarding. Connection Science 33, 3 (2021), 735–752.Google ScholarGoogle ScholarCross RefCross Ref
  14. Jiacheng Hou, Huanzhang Xia, Haoye Lu, and Amiya Nayak. 2021. A GNN-based Approach to Optimize Cache Hit Ratio in NDN Networks. In 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bo Hu, Hongfeng Xie, Yutao Ma, Jian Wang, and Liang-Jie Zhang. 2018. A robust retail POS system based on blockchain and edge computing. In International conference on edge computing. Springer, 99–110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Atiyeh Javaheri, Seyyed Naser Seyyed Hashemi, and Ali Bohlooli. 2020. Hybrid Naming Scheme Based PURSUIT Architecture for Smart City. In 2020 4th International Conference on Smart City, Internet of Things and Applications (SCIOT). 33–38. https://doi.org/10.1109/SCIOT50840.2020.9250207Google ScholarGoogle ScholarCross RefCross Ref
  17. Sarantis Kalafatidis, Vassilis Demiroglou, Sotiris Skaperas, Georgios Tsoulouhas, Polychronis Valsamas, Lefteris Mamatas, and Vassilis Tsaoussidis. 2022. Experiments with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments. In 2022 IEEE Symposium on Computers and Communications (ISCC). IEEE, 1–3.Google ScholarGoogle Scholar
  18. Ouassim Karrakchou, Nancy Samaan, and Ahmed Karmouch. 2020. Fctrees: A front-coded family of compressed tree-based fib structures for ndn routers. IEEE Transactions on Network and Service Management 17, 2(2020), 1167–1180.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, and Adlen Ksentini. 2019. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Communications Surveys & Tutorials 22, 1 (2019), 320–351.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Fatma Kutlu Gündoğdu and Cengiz Kahraman. 2019. Spherical fuzzy sets and spherical fuzzy TOPSIS method. Journal of intelligent & fuzzy systems 36, 1 (2019), 337–352.Google ScholarGoogle ScholarCross RefCross Ref
  21. Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Han Liu, Arcangelo Castiglione, and Kuan-Ching Li. 2022. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Computing 26, 9 (2022), 4423–4440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, and Shaoyong Guo. 2020. Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity. In International Conference on Artificial Intelligence and Security. Springer, 786–797.Google ScholarGoogle Scholar
  23. Yang Li and Tao Yang. 2018. Word embedding for understanding natural language: a survey. In Guide to big data applications. Springer, 83–104.Google ScholarGoogle Scholar
  24. Teng Liang, Junxiao Shi, and Beichuan Zhang. 2020. On the prefix granularity problem in NDN adaptive forwarding. In Proceedings of the 7th ACM Conference on Information-Centric Networking. 41–51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Wei Liang, Songyou Xie, Jiahong Cai, Chong Wang, Yujie Hong, and Xiaoyan Kui. 2021. Novel private data access control scheme suitable for mobile edge computing. China Communications 18, 11 (2021), 92–103.Google ScholarGoogle ScholarCross RefCross Ref
  26. Spyridon Mastorakis and Abderrahmen Mtibaa. 2019. Towards service discovery and invocation in data-centric edge networks. In 2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  27. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, and Hassan Mathkour. 2019. Least fresh first cache replacement policy for NDN-based IoT networks. Pervasive and Mobile Computing 52 (2019), 60–70.Google ScholarGoogle ScholarCross RefCross Ref
  28. Travis Mick, Reza Tourani, and Satyajayant Misra. 2018. LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities. IEEE Internet of Things Journal 5, 2 (2018), 755–764. https://doi.org/10.1109/JIOT.2017.2725238Google ScholarGoogle ScholarCross RefCross Ref
  29. Muhammad Ali Naeem, Rashid Ali, Byung-Seo Kim, Shahrudin Awang Nor, and Suhaidi Hassan. 2018. A periodic caching strategy solution for the smart city in information-centric Internet of Things. Sustainability 10, 7 (2018), 2576.Google ScholarGoogle ScholarCross RefCross Ref
  30. Muhammad Ali Naeem, Tu N Nguyen, Rashid Ali, Korhan Cengiz, Yahui Meng, and Tahir Khurshaid. 2021. Hybrid cache management in IoT-based named data networking. IEEE Internet of Things Journal 9, 10 (2021), 7140–7150.Google ScholarGoogle ScholarCross RefCross Ref
  31. Sabuzima Nayak, Ripon Patgiri, and Angana Borah. 2021. A survey on the roles of Bloom Filter in implementation of the Named Data Networking. Computer Networks 196(2021), 108232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Miguel Ortiz-Barrios, Chris Nugent, Ian Cleland, Mark Donnelly, and Antanas Verikas. 2020. Selecting the most suitable classification algorithm for supporting assistive technology adoption for people with dementia: a multicriteria framework. Journal of Multi-Criteria Decision Analysis 27, 1-2 (2020), 20–38.Google ScholarGoogle ScholarCross RefCross Ref
  33. Gopika Premsankar, Mario Di Francesco, and Tarik Taleb. 2018. Edge computing for the Internet of Things: A case study. IEEE Internet of Things Journal 5, 2 (2018), 1275–1284.Google ScholarGoogle ScholarCross RefCross Ref
  34. Mahmood M Salih, BB Zaidan, and AA Zaidan. 2020. Fuzzy decision by opinion score method. Applied Soft Computing 96 (2020), 106595.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Mahmood M Salih, BB Zaidan, AA Zaidan, and Mohamed A Ahmed. 2019. Survey on fuzzy TOPSIS state-of-the-art between 2007 and 2017. Computers & Operations Research 104 (2019), 207–227.Google ScholarGoogle ScholarCross RefCross Ref
  36. Klaus Schneider. 2019. Multipath data transport in named data networking. (2019).Google ScholarGoogle Scholar
  37. Pradip Kumar Sharma, Mu-Yen Chen, and Jong Hyuk Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. Ieee Access 6(2017), 115–124.Google ScholarGoogle ScholarCross RefCross Ref
  38. Chi-Sheng Shih, Jyun-Jhe Chou, and Kwei-Jay Lin. 2018. WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings.J. Internet Serv. Inf. Secur. 8, 2 (2018), 1–17.Google ScholarGoogle Scholar
  39. HS Shrisha and Uma Boregowda. 2022. An energy efficient and scalable endpoint linked green content caching for Named Data Network based Internet of Things. Results in Engineering 13 (2022), 100345.Google ScholarGoogle ScholarCross RefCross Ref
  40. Xiaonan Wang and Shaohao Cai. 2020. Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud. Future Generation Computer Systems 112 (2020), 320–329.Google ScholarGoogle ScholarCross RefCross Ref
  41. Liang Wei, Ning Zuoting, Xie Songyou, Hu Yupeng, Lu Shaofeng, and Zhang Dafang. 2021. Authorization and Consensus Fusion Approach for Blockchain-based Internet of Things. Information Science (2021).Google ScholarGoogle Scholar
  42. Yinhao Xiao, Yizhen Jia, Chunchi Liu, Xiuzhen Cheng, Jiguo Yu, and Weifeng Lv. 2019. Edge computing security: State of the art and challenges. Proc. IEEE 107, 8 (2019), 1608–1631.Google ScholarGoogle ScholarCross RefCross Ref
  43. Xiaolong Xu, Xihua Liu, Zhanyang Xu, Fei Dai, Xuyun Zhang, and Lianyong Qi. 2019. Trust-oriented IoT service placement for smart cities in edge computing. IEEE Internet of Things Journal 7, 5 (2019), 4084–4091.Google ScholarGoogle ScholarCross RefCross Ref
  44. Zisang Xu, Wei Liang, Kuan-Ching Li, Jianbo Xu, Albert Y Zomaya, and Jixin Zhang. 2021. A Time-sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Transactions on Industrial Informatics(2021).Google ScholarGoogle Scholar
  45. Yu Zhang, Zhongda Xia, Alexander Afanasyev, and Lixia Zhang. 2019. A note on routing scalability in named data networking. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  46. Xiaokang Zhou, Wei Liang, I Kevin, Kai Wang, Zheng Yan, Laurence T Yang, Wei Wei, Jianhua Ma, and Qun Jin. 2023. Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems. IEEE Wireless Communications 30, 2 (2023), 82–89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Xiaokang Zhou, Wei Liang, I Kevin, Kai Wang, and Laurence T Yang. 2020. Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations. IEEE Transactions on Computational Social Systems 8, 1 (2020), 171–178.Google ScholarGoogle ScholarCross RefCross Ref
  48. Xiaokang Zhou, Wei Liang, Ke Yan, Weimin Li, I Kevin, Kai Wang, Jianhua Ma, and Qun Jin. 2022. Edge-enabled two-stage scheduling based on deep reinforcement learning for internet of everything. IEEE Internet of Things Journal 10, 4 (2022), 3295–3304.Google ScholarGoogle ScholarCross RefCross Ref
  49. Xiaokang Zhou, Xiaozhou Ye, I Kevin, Kai Wang, Wei Liang, Nirmal Kumar C Nair, Shohei Shimizu, Zheng Yan, and Qun Jin. 2023. Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications. IEEE Transactions on Computational Social Systems (2023).Google ScholarGoogle Scholar
  50. Xiaokang Zhou, Xiaozhou Ye, I Kevin, Kai Wang, Wei Liang, Nirmal Kumar C Nair, Shohei Shimizu, Zheng Yan, and Qun Jin. 2023. Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications. IEEE Transactions on Computational Social Systems (2023).Google ScholarGoogle Scholar
  51. Xiaokang Zhou, Xuzhe Zheng, Xuesong Cui, Jiashuai Shi, Wei Liang, Zheng Yan, Laurance T Yang, Shohei Shimizu, I Kevin, and Kai Wang. 2023. Digital twin enhanced federated reinforcement learning with lightweight knowledge distillation in mobile networks. IEEE Journal on Selected Areas in Communications (2023).Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Xiaokang Zhou, Xuzhe Zheng, Tian Shu, Wei Liang, I Kevin, Kai Wang, Lianyong Qi, Shohei Shimizu, and Qun Jin. 2023. Information theoretic learning-enhanced dual-generative adversarial networks with causal representation for robust OOD generalization. IEEE Transactions on Neural Networks and Learning Systems (2023).Google ScholarGoogle Scholar

Index Terms

  1. UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Sensor Networks
            ACM Transactions on Sensor Networks Just Accepted
            ISSN:1550-4859
            EISSN:1550-4867
            Table of Contents

            Copyright © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Online AM: 14 February 2024
            • Accepted: 8 February 2024
            • Revised: 13 October 2023
            • Received: 24 January 2023
            Published in tosn Just Accepted

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)95
            • Downloads (Last 6 weeks)36

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader