Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things

There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resour...

Full description

Bibliographic Details
Main Authors: Bradbury, M. (Author), Burton, J. (Author), Butler, M. (Author), Flores, D. (Author), Jhumka, A. (Author), Watson, T. (Author)
Format: Article
Language:English
Published: Association for Computing Machinery 2022
Subjects:
Online Access:View Fulltext in Publisher
LEADER 02757nam a2200445Ia 4500
001 10.1145-3510424
008 220425s2022 CNT 000 0 und d
020 |a 15504859 (ISSN) 
245 1 0 |a Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things 
260 0 |b Association for Computing Machinery  |c 2022 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1145/3510424 
520 3 |a There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resource-rich edge nodes, which requires a framework that facilitates the selection of suitable edge nodes to perform task offloading. Therefore, in this article, we present a novel trust-model-driven system architecture, based on behavioral evidence, that is suitable for resource-constrained IoT devices and supports computation offloading. We demonstrate the viability of the proposed architecture with an example deployment of the Beta Reputation System trust model on real hardware to capture node behaviors. The open environment of edge-based IoT networks means that threats against edge nodes can lead to deviation from expected behavior. Hence, we perform a threat modeling to identify such threats. The proposed system architecture includes threat handling mechanisms that provide security properties such as confidentiality, authentication, and non-repudiation of messages in required scenarios and operate within the resource constraints. We evaluate the efficacy of the threat handling mechanisms and identify future work for the standards used. © 2022 Copyright held by the owner/author(s). 
650 0 4 |a computation offloading 
650 0 4 |a Computation offloading 
650 0 4 |a Computer architecture 
650 0 4 |a edge computing 
650 0 4 |a Edge computing 
650 0 4 |a Edge computing 
650 0 4 |a Edge nodes 
650 0 4 |a Internet of things 
650 0 4 |a Internet of Things 
650 0 4 |a Network architecture 
650 0 4 |a resource constrained 
650 0 4 |a Resource constrained 
650 0 4 |a Resource Constraint 
650 0 4 |a Systems architecture 
650 0 4 |a Task offloading 
650 0 4 |a Threat modeling 
650 0 4 |a threat modelling 
650 0 4 |a Trust 
650 0 4 |a Trust 
650 0 4 |a Trust models 
650 0 4 |a Trusted computing 
700 1 |a Bradbury, M.  |e author 
700 1 |a Burton, J.  |e author 
700 1 |a Butler, M.  |e author 
700 1 |a Flores, D.  |e author 
700 1 |a Jhumka, A.  |e author 
700 1 |a Watson, T.  |e author 
773 |t ACM Transactions on Sensor Networks