Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey

With the explosive growth of data generated by the Internet of Things (IoT) devices, the traditional cloud computing model by transferring all data to the cloud for processing has gradually failed to meet the real-time requirement of IoT services due to high network latency. Edge computing (EC) as a new computing paradigm shifts the data processing from the cloud to the edge nodes (ENs), greatly improving the Quality of Service (QoS) for those IoT applications with low-latency requirements. However, compared to other endpoint devices such as smartphones or computers, distributed ENs are more vulnerable to attacks for restricted computing resources and storage. In the context that security and privacy preservation have become urgent issues for EC, great progress in artificial intelligence (AI) opens many possible windows to address the security challenges. The powerful learning ability of AI enables the system to identify malicious attacks more accurately and efficiently. Meanwhile, to a certain extent, transferring model parameters instead of raw data avoids privacy leakage. In this paper, a comprehensive survey of the contribution of AI to the IoT security in EC is presented. First, the research status and some basic definitions are introduced. Next, the IoT service framework with EC is discussed. The survey of privacy preservation and blockchain for edge-enabled IoT services with AI is then presented. In the end, the open issues and challenges on the application of AI in IoT services based on EC are discussed.

[1]  Quan Zhang,et al.  Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.

[2]  Landon P. Cox,et al.  The Emerging Landscape of Edge Computing , 2020, GetMobile Mob. Comput. Commun..

[3]  Liu Huan,et al.  Research on secure transmission and storage of energy IoT information based on Blockchain , 2020 .

[4]  Shilin Wen,et al.  Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning , 2019, IEEE Transactions on Industrial Informatics.

[5]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[6]  Muhammad Imran,et al.  Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..

[7]  N. G. J. Dias,et al.  A Survey on Blockchain Technology Concepts, Applications, and Issues , 2020, SN Computer Science.

[8]  Youakim Badr,et al.  Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine , 2018, IEEE Internet of Things Journal.

[9]  Massimo Ruo Roch,et al.  Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World , 2019, Future Internet.

[10]  Jun Wu,et al.  Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach , 2019, IEEE Transactions on Industrial Informatics.

[11]  Dongxi Liu,et al.  Local Differential Privacy for Deep Learning , 2019, IEEE Internet of Things Journal.

[12]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[13]  Xiaoyu Xia,et al.  Cost-Effective App Data Distribution in Edge Computing , 2021, IEEE Transactions on Parallel and Distributed Systems.

[14]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[15]  Reza M. Parizi,et al.  AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things , 2020, Neural Computing and Applications.

[16]  Xihua Liu,et al.  Privacy-aware offloading for training tasks of generative adversarial network in edge computing , 2020, Inf. Sci..

[17]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[18]  Fei Dai,et al.  Trust-Oriented IoT Service Placement for Smart Cities in Edge Computing , 2020, IEEE Internet of Things Journal.

[19]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[20]  Lianyong Qi,et al.  Amplified locality‐sensitive hashing‐based recommender systems with privacy protection , 2020 .

[21]  Lianyong Qi,et al.  Keywords-Driven and Popularity-Aware Paper Recommendation Based on Undirected Paper Citation Graph , 2020, Complex..

[22]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[23]  Xuyun Zhang,et al.  Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment , 2020, Comput. Commun..

[24]  Jeffrey Xu Yu,et al.  Target-Aware Holistic Influence Maximization in Spatial Social Networks , 2022, IEEE Transactions on Knowledge and Data Engineering.

[25]  Xing Zhang,et al.  Adaptive Computation Offloading With Edge for 5G-Envisioned Internet of Connected Vehicles , 2020, IEEE Transactions on Intelligent Transportation Systems.

[26]  Xuyun Zhang,et al.  Diversified service recommendation with high accuracy and efficiency , 2020, Knowl. Based Syst..

[27]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[28]  Xuyun Zhang,et al.  BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.

[29]  Ying Chen,et al.  Energy Efficient Dynamic Offloading in Mobile Edge Computing for Internet of Things , 2019, IEEE Transactions on Cloud Computing.

[30]  Wang Yifan,et al.  Edge Computing: State-of-the-Art and Future Directions , 2019 .

[31]  Geyong Min,et al.  Deploying Edge Computing Nodes for Large-Scale IoT: A Diversity Aware Approach , 2018, IEEE Internet of Things Journal.

[32]  Weixian Liao,et al.  Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.

[33]  Abhishek Chandra,et al.  Nebula: Distributed Edge Cloud for Data Intensive Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[34]  Xiaohui Liang,et al.  Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.

[35]  Lin Li,et al.  How textual quality of online reviews affect classification performance: a case of deep learning sentiment analysis , 2018, Neural Computing and Applications.

[36]  Guangming Cui,et al.  A Game-Theoretical Approach for User Allocation in Edge Computing Environment , 2020, IEEE Transactions on Parallel and Distributed Systems.

[37]  Jie Zhang,et al.  A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment , 2019, IEEE Transactions on Computational Social Systems.

[38]  Muhammad Imran,et al.  Securing IoTs in distributed blockchain: Analysis, requirements and open issues , 2019, Future Gener. Comput. Syst..

[39]  Liu Fang,et al.  Edge Computing: Platforms, Applications and Challenges , 2018 .

[40]  R Kalaivani,et al.  Additive Gaussian Noise Based Data Perturbation in Multi-Level Trust Privacy Preserving Data Mining , 2014 .

[41]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[42]  Feng Xia,et al.  Community-diversified influence maximization in social networks , 2020, Inf. Syst..

[43]  Atay Ozgovde,et al.  How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions , 2017, IEEE Communications Surveys & Tutorials.

[44]  Petros Spachos,et al.  Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey , 2020, J. Netw. Comput. Appl..

[45]  Jiguo Yu,et al.  Edge Computing Security: State of the Art and Challenges , 2019, Proceedings of the IEEE.

[46]  Zibin Zheng,et al.  Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things , 2019, IEEE Internet of Things Journal.