Northern Kentucky University

Grade Level at Time of Presentation

Sophomore

Major

Computer Science

Minor

Data Science

2nd Grade Level at Time of Presentation

Sophomore

2nd Student Major

Computer Science

2nd Student Minor

Data cience

Institution 23-24

Northern Kentucky University

KY House District #

Greater Cincinnati

KY Senate District #

Greater Cincinnati

Department

School of Computing and Analytics, College of Informatics

Abstract

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes the establishment of a robust security infrastructure from the outset. By incorporating an Intrusion Detection System and leveraging blockchain for immutable data storage, we create a formidable barrier against security threats. The feasibility of the proposed model for the secure hierarchical architecture is justified by integrating the design with the open-source platform EdgeX Foundry, streamlining device management and data flow among interconnected nodes.

A central monitoring device orchestrates system operations, while an acclaimed threat detection model within the server scrutinizes network activities for anomalies. When suspicious actions are detected, the system swiftly alerts other clusters, facilitating a prompt and unified response.

The use of blockchain technology not only enhances the intrusion detection capabilities but also guarantees secure and verifiable data storage. Our findings confirm that the framework delivers secure, optimized IoT services with robust intrusion detection and effective data management. The secure-by-design strategy is both advantageous and practical, offering a superior solution to the pressing security challenges in edge computing.

Share

COinS
 

Securing Edge Computing: A Hierarchical IoT Service Framework

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes the establishment of a robust security infrastructure from the outset. By incorporating an Intrusion Detection System and leveraging blockchain for immutable data storage, we create a formidable barrier against security threats. The feasibility of the proposed model for the secure hierarchical architecture is justified by integrating the design with the open-source platform EdgeX Foundry, streamlining device management and data flow among interconnected nodes.

A central monitoring device orchestrates system operations, while an acclaimed threat detection model within the server scrutinizes network activities for anomalies. When suspicious actions are detected, the system swiftly alerts other clusters, facilitating a prompt and unified response.

The use of blockchain technology not only enhances the intrusion detection capabilities but also guarantees secure and verifiable data storage. Our findings confirm that the framework delivers secure, optimized IoT services with robust intrusion detection and effective data management. The secure-by-design strategy is both advantageous and practical, offering a superior solution to the pressing security challenges in edge computing.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.