Back to Search Start Over

Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.

Authors :
BRADBURY, MATTHEW
JHUMKA, ARSHAD
WATSON, TIM
FLORES, DENYS
BURTON, JONATHAN
BUTLER, MATTHEW
Source :
ACM Transactions on Sensor Networks; Apr2022, Vol. 18 Issue 2, p1-41, 41p
Publication Year :
2022

Abstract

There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resource-rich edge nodes, which requires a framework that facilitates the selection of suitable edge nodes to perform task offloading. Therefore, in this article, we present a novel trust-model-driven system architecture, based on behavioral evidence, that is suitable for resource-constrained IoT devices and supports computation offloading. We demonstrate the viability of the proposed architecture with an example deployment of the Beta Reputation System trust model on real hardware to capture node behaviors. The open environment of edge-based IoT networks means that threats against edge nodes can lead to deviation from expected behavior. Hence, we perform a threat modeling to identify such threats. The proposed system architecture includes threat handling mechanisms that provide security properties such as confidentiality, authentication, and non-repudiation of messages in required scenarios and operate within the resource constraints. We evaluate the efficacy of the threat handling mechanisms and identify future work for the standards used. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15504859
Volume :
18
Issue :
2
Database :
Complementary Index
Journal :
ACM Transactions on Sensor Networks
Publication Type :
Academic Journal
Accession number :
156183325
Full Text :
https://doi.org/10.1145/3510424