Abstract
Communications among IoT devices and backend servers are among the most critical aspects of IoT system, as it not only governs hardware requirement and system performance but also impacts security and privacy of the system. Multi-access edge computing (MEC) is an enabler for service development in 5G. Furthermore, MEC will reduce IoT system communication cost such as latency and bandwidth thanks to its ubiquitously nearby processing and storage capability. Also, MEC will provide opportunities to enhance IoT system’s network privacy, which cannot be solved by IoT system itself easily. In this paper, we present MEC enhanced mobility support system for IoT system: with MEC it can be implemented with low operation cost and overhead and can protect IoT system’s user from being exploited due to the exposed network location of data uploading and the control signals.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), pp 1–8
Aleisa N, Renaud K (2017) Privacy of the Internet of Things: a systematic literature review. In: Hawaii international conference on system sciences
Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: Proceedings of the sixth international conference on advances in future internet, pp 48–54
ETSI. Multi-access edge computing. http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing. Accessed 20 June 2018
Garvelink B (2015) Mobile edge computing: a building block for 5G. https://www.telecompaper.com/background/mobile-edge-computing-a-building-block-for-5g--1092281. Accessed 20 June 2018
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gen Comput Syst 29(7):1645–1660. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications Big Data, Scalable Analytics, and Beyond
Howard PN (2015) Pax Technica: how the Internet of Things may set us free or lock us up. Yale University Press, New Haven
Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853
McEwen A, Cassimally H (2013) Designing the Internet of Things. Wiley, New York
Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International conference on information technology—new generations, pp 601–605
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gen Comput Syst 78(Part 2):680–698
Sain M, Kang YJ, Lee HJ (2017) Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International conference on advanced communication technology (ICACT), pp 699–704
Sanchez L, Muoz L, Galache JA, Sotres P, Santana JR, Gutierrez V, Ramdhany R, Gluhak Alex, Krco S, Theodoridis E, Pfisterer D (2014) Smartsantander: Iot experimentation over a smart city testbed. Comput Netw 61(Supplement C):217–238 (Special issue on Future Internet Testbeds Part I)
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646
Tao F, Zuo Y, Xu LD, Zhang L (2014) IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Ind Inform 10(2):1547–1557
Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54–61
Tran TX, Pompili D (2017) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR. arXiv:1705.00704
Yoshigoe K, Dai W, Abramson M, Jacobs A (2014) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW), pp 1–7
Zhang P, Durresi A (2017) Cloud aided internet mobility for privacy protection. In: 2017 IEEE international conference on communications (ICC), pp 1–6
Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications, pp 230–234
Zhao K, Ge L (2013) A survey on the Internet of Things security. In: 2013 Ninth international conference on computational intelligence and security, pp 663–667
Acknowledgements
This work is partially supported by National Science Foundation under Grant No. 1547411, and by National Institute of Food and Agriculture (NIFA) USDA AWARD NUMBER: 2017-67003-26057.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, P., Durresi, M. & Durresi, A. Multi-access edge computing aided mobility for privacy protection in Internet of Things. Computing 101, 729–742 (2019). https://doi.org/10.1007/s00607-018-0639-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-018-0639-0