Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Multi-access edge computing aided mobility for privacy protection in Internet of Things

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Communications among IoT devices and backend servers are among the most critical aspects of IoT system, as it not only governs hardware requirement and system performance but also impacts security and privacy of the system. Multi-access edge computing (MEC) is an enabler for service development in 5G. Furthermore, MEC will reduce IoT system communication cost such as latency and bandwidth thanks to its ubiquitously nearby processing and storage capability. Also, MEC will provide opportunities to enhance IoT system’s network privacy, which cannot be solved by IoT system itself easily. In this paper, we present MEC enhanced mobility support system for IoT system: with MEC it can be implemented with low operation cost and overhead and can protect IoT system’s user from being exploited due to the exposed network location of data uploading and the control signals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), pp 1–8

  2. Aleisa N, Renaud K (2017) Privacy of the Internet of Things: a systematic literature review. In: Hawaii international conference on system sciences

  3. Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: Proceedings of the sixth international conference on advances in future internet, pp 48–54

  4. ETSI. Multi-access edge computing. http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing. Accessed 20 June 2018

  5. Garvelink B (2015) Mobile edge computing: a building block for 5G. https://www.telecompaper.com/background/mobile-edge-computing-a-building-block-for-5g--1092281. Accessed 20 June 2018

  6. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gen Comput Syst 29(7):1645–1660. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications Big Data, Scalable Analytics, and Beyond

  7. Howard PN (2015) Pax Technica: how the Internet of Things may set us free or lock us up. Yale University Press, New Haven

    Google Scholar 

  8. Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853

    Article  Google Scholar 

  9. McEwen A, Cassimally H (2013) Designing the Internet of Things. Wiley, New York

    Google Scholar 

  10. Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International conference on information technology—new generations, pp 601–605

  11. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gen Comput Syst 78(Part 2):680–698

    Article  Google Scholar 

  12. Sain M, Kang YJ, Lee HJ (2017) Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International conference on advanced communication technology (ICACT), pp 699–704

  13. Sanchez L, Muoz L, Galache JA, Sotres P, Santana JR, Gutierrez V, Ramdhany R, Gluhak Alex, Krco S, Theodoridis E, Pfisterer D (2014) Smartsantander: Iot experimentation over a smart city testbed. Comput Netw 61(Supplement C):217–238 (Special issue on Future Internet Testbeds Part I)

    Article  Google Scholar 

  14. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  15. Tao F, Zuo Y, Xu LD, Zhang L (2014) IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Ind Inform 10(2):1547–1557

    Article  Google Scholar 

  16. Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54–61

    Article  Google Scholar 

  17. Tran TX, Pompili D (2017) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR. arXiv:1705.00704

  18. Yoshigoe K, Dai W, Abramson M, Jacobs A (2014) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW), pp 1–7

  19. Zhang P, Durresi A (2017) Cloud aided internet mobility for privacy protection. In: 2017 IEEE international conference on communications (ICC), pp 1–6

  20. Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications, pp 230–234

  21. Zhao K, Ge L (2013) A survey on the Internet of Things security. In: 2013 Ninth international conference on computational intelligence and security, pp 663–667

Download references

Acknowledgements

This work is partially supported by National Science Foundation under Grant No. 1547411, and by National Institute of Food and Agriculture (NIFA) USDA AWARD NUMBER: 2017-67003-26057.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjan Durresi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Durresi, M. & Durresi, A. Multi-access edge computing aided mobility for privacy protection in Internet of Things. Computing 101, 729–742 (2019). https://doi.org/10.1007/s00607-018-0639-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-018-0639-0

Keywords

Mathematics Subject Classification