Privacy-preserving multi-channel communication in Edge-of-Things

Abstract Contemporary booming growth of the Internet-based techniques has risen a revolution of network-oriented applications. A connected environment further drives the amalgamation of various techniques, such as edge computing, cloud computing and Internet-of-Things (IoT). Privacy concerns have appeared throughout the process of data transmissions, some of which are caused by the low security communication protocols. In practice, high security protection protocols generally require a higher-level computing resource due to more computation workloads and communication manipulations. The implementation of high security communications is restricted when data size becomes large. This work focuses on the issue of the conflict between privacy protection and efficiency and proposes a new approach for providing higher-level security transmission using multi-channel communications. We implement experiment evaluations to examine the performance of the proposed approach.

[1]  Mohsen Guizani,et al.  Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.

[2]  Ivan Stojmenovic,et al.  Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and Actuation for Large-Scale Cyber-Physical Systems , 2014, IEEE Internet of Things Journal.

[3]  Onur Tan,et al.  Privacy-Cost Trade-offs in Demand-Side Management With Storage , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Lajos Hanzo,et al.  Adaptive Coding and Modulation for Large-Scale Antenna Array-Based Aeronautical Communications in the Presence of Co-Channel Interference , 2017, IEEE Transactions on Wireless Communications.

[6]  Daqiang Zhang,et al.  Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions , 2014, IEEE Communications Magazine.

[7]  Dong In Kim,et al.  Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks , 2015, IEEE Transactions on Cognitive Communications and Networking.

[8]  Keke Gai,et al.  Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..

[9]  Keke Gai,et al.  Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..

[10]  Athanasios V. Vasilakos,et al.  Network Security and Privacy Challenges in Smart Vehicle-to-Grid , 2017, IEEE Wireless Communications.

[11]  Yafeng Yin,et al.  Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems , 2016, IEEE Transactions on Vehicular Technology.

[12]  Haitao Yuan,et al.  WARM: Workload-Aware Multi-Application Task Scheduling for Revenue Maximization in SDN-Based Cloud Data Center , 2018, IEEE Access.

[13]  Giancarlo Fortino,et al.  BodyCloud: A SaaS approach for community Body Sensor Networks , 2014, Future Gener. Comput. Syst..

[14]  Chen Wang,et al.  Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems , 2020, Future Gener. Comput. Syst..

[15]  Min Chen,et al.  AIWAC: affective interaction through wearable computing and cloud technology , 2015, IEEE Wireless Communications.

[16]  Marwan Krunz,et al.  Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interference , 2014, Ad Hoc Networks.

[17]  Shengli Xie,et al.  QoS Differential Scheduling in Cognitive-Radio-Based Smart Grid Networks: An Adaptive Dynamic Programming Approach , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[18]  M. Shamim Hossain,et al.  A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.

[19]  Taeshik Shon,et al.  Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture , 2016, Future Gener. Comput. Syst..

[20]  Xu Chen,et al.  Cost-Effective and Privacy-Preserving Energy Management for Smart Meters , 2015, IEEE Transactions on Smart Grid.

[21]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[22]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[23]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[24]  Colin Boyd,et al.  Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.

[25]  Keke Gai,et al.  Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[26]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[27]  Jinjun Chen,et al.  External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..

[28]  Tarek R. Sheltami,et al.  WSN in cyber physical systems: Enhanced energy management routing approach using software agents , 2014, Future Gener. Comput. Syst..

[29]  Keke Gai,et al.  Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[30]  Keke Gai,et al.  Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing , 2018, IEEE Transactions on Sustainable Computing.

[31]  Qian Zhang,et al.  Privacy-Preserving Collaborative Spectrum Sensing With Multiple Service Providers , 2015, IEEE Transactions on Wireless Communications.

[32]  Hsiao-Hwa Chen,et al.  Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.

[33]  Long Hu,et al.  ASA: Against statistical attacks for privacy-aware users in Location Based Service , 2017, Future Gener. Comput. Syst..

[34]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[35]  Jiming Chen,et al.  Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.

[36]  Ness B. Shroff,et al.  Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks , 2009, TNET.

[37]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[38]  Keke Gai,et al.  A survey on FinTech , 2018, J. Netw. Comput. Appl..

[39]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.