The rapid development of smart Internet of Things (IoT) and its multimedia applications with conventional cloud and edge computing platforms are driving a new trend that shifts the functions of centralized networks. These centralized cloud and edge computing networks are encountering various new routing and security challenges. These networks are vulnerable due to different malicious activities and security attacks. The malicious activities lead to link failure and wrong forwarding decisions and or divert the paths. To detect the malicious activities in these networks, we need an efficient detection system for malicious switches in Software Defined Networks (SDN) data plan and leads to data traffic diversion and degrades the network performance. Another aspect is the trust of edge devices and always need to trustworthy devices to forward the IoT devices data to SDN networks. In this paper, we proposed a Software-Defined Network-based Anomaly Detection System (SDN-ADS) for edge computing-based system architecture for IoT networks. Afterwards, we proposed an anomaly detection system to detect the device's behaviour for SDN and edge computing networks. Also, we proposed a Trusted Authority for Edge Computing (TA-Edge) to ensure the trust of edge devices for data forwarding. The edge device is acting as a certificate authority for the specified trusted domain. To overcome the edge devices overhead, in this proposed TA-Edge model, the edge node, only one time, verifies the certificate and when the trust is established, all communication can be done through local certificates. The simulation results show the better performance of proposed systems in terms of different performance parameters.

Anomaly detection and trust authority in artificial intelligence and cloud computing / Qureshi, K. N.; Jeon, G.; Piccialli, F.. - In: COMPUTER NETWORKS. - ISSN 1389-1286. - 184:(2021), p. 107647. [10.1016/j.comnet.2020.107647]

Anomaly detection and trust authority in artificial intelligence and cloud computing

Piccialli F.
2021

Abstract

The rapid development of smart Internet of Things (IoT) and its multimedia applications with conventional cloud and edge computing platforms are driving a new trend that shifts the functions of centralized networks. These centralized cloud and edge computing networks are encountering various new routing and security challenges. These networks are vulnerable due to different malicious activities and security attacks. The malicious activities lead to link failure and wrong forwarding decisions and or divert the paths. To detect the malicious activities in these networks, we need an efficient detection system for malicious switches in Software Defined Networks (SDN) data plan and leads to data traffic diversion and degrades the network performance. Another aspect is the trust of edge devices and always need to trustworthy devices to forward the IoT devices data to SDN networks. In this paper, we proposed a Software-Defined Network-based Anomaly Detection System (SDN-ADS) for edge computing-based system architecture for IoT networks. Afterwards, we proposed an anomaly detection system to detect the device's behaviour for SDN and edge computing networks. Also, we proposed a Trusted Authority for Edge Computing (TA-Edge) to ensure the trust of edge devices for data forwarding. The edge device is acting as a certificate authority for the specified trusted domain. To overcome the edge devices overhead, in this proposed TA-Edge model, the edge node, only one time, verifies the certificate and when the trust is established, all communication can be done through local certificates. The simulation results show the better performance of proposed systems in terms of different performance parameters.
2021
Anomaly detection and trust authority in artificial intelligence and cloud computing / Qureshi, K. N.; Jeon, G.; Piccialli, F.. - In: COMPUTER NETWORKS. - ISSN 1389-1286. - 184:(2021), p. 107647. [10.1016/j.comnet.2020.107647]
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/826211
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 50
  • ???jsp.display-item.citation.isi??? 25
social impact