论文标题

stec-iot:通过在物联网上虚拟化边缘计算的安全策略

STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT

论文作者

Zhang, Peiying, Jiang, Chunxiao, Pang, Xue, Qian, Yi

论文摘要

在很大程度上,边缘计算(EC)的部署可以减轻物联网爆炸性增长的负担。作为物联网和云服务器之间的功能强大的枢纽,边缘设备使云的传输不再复杂。但是,边缘节点面临着一系列问题,例如大量,广泛的分布和复杂的环境,不应低估边缘计算的安全性。基于此,我们提出了一种策略,以通过虚拟化边缘节点来提高边缘计算的安全性。首先,我们提出了一个边缘节点分区的策略,将处理不同类型的事物的边缘节点虚拟化到各种虚拟网络中,这些虚拟网络被部署在边缘节点和云服务器之间。其次,考虑到不同的信息传输具有不同的安全要求,我们提出了基于安全级别测量的安全策略。最后,通过模拟实验,我们将致力于虚拟网络安全的现有高级算法进行比较,并证明本文提出的模型在增强边缘计算的安全性方面具有明确的渐进性。

To a large extent, the deployment of edge computing (EC) can reduce the burden of the explosive growth of the Internet of things. As a powerful hub between the Internet of things and cloud servers, edge devices make the transmission of cloud to things no longer complicated. However, edge nodes are faced with a series of problems, such as large number, a wide range of distribution, and complex environment, the security of edge computing should not be underestimated. Based on this, we propose a tactic to improve the safety of edge computing by virtualizing edge nodes. In detail, first of all, we propose a strategy of edge node partition, virtualize the edge nodes dealing with different types of things into various virtual networks, which are deployed between the edge nodes and the cloud server. Second, considering that different information transmission has different security requirement, we propose a security tactic based on security level measurement. Finally, through simulation experiments, we compare with the existing advanced algorithms which are committed to virtual network security, and prove that the model proposed in this paper has definite progressiveness in enhancing the security of edge computing.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源