Northern Kentucky University
Grade Level at Time of Presentation
Sophomore
Major
Computer Science
Minor
Data Science
2nd Grade Level at Time of Presentation
Sophomore
2nd Student Major
Computer Science
2nd Student Minor
Data cience
Institution 23-24
Northern Kentucky University
KY House District #
Greater Cincinnati
KY Senate District #
Greater Cincinnati
Faculty Advisor/ Mentor
Rasib Khan, PhD.
Department
School of Computing and Analytics, College of Informatics
Abstract
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes the establishment of a robust security infrastructure from the outset. By incorporating an Intrusion Detection System and leveraging blockchain for immutable data storage, we create a formidable barrier against security threats. The feasibility of the proposed model for the secure hierarchical architecture is justified by integrating the design with the open-source platform EdgeX Foundry, streamlining device management and data flow among interconnected nodes.
A central monitoring device orchestrates system operations, while an acclaimed threat detection model within the server scrutinizes network activities for anomalies. When suspicious actions are detected, the system swiftly alerts other clusters, facilitating a prompt and unified response.
The use of blockchain technology not only enhances the intrusion detection capabilities but also guarantees secure and verifiable data storage. Our findings confirm that the framework delivers secure, optimized IoT services with robust intrusion detection and effective data management. The secure-by-design strategy is both advantageous and practical, offering a superior solution to the pressing security challenges in edge computing.
Included in
Computer and Systems Architecture Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, Hardware Systems Commons, Other Computer Engineering Commons, Robotics Commons
Securing Edge Computing: A Hierarchical IoT Service Framework
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes the establishment of a robust security infrastructure from the outset. By incorporating an Intrusion Detection System and leveraging blockchain for immutable data storage, we create a formidable barrier against security threats. The feasibility of the proposed model for the secure hierarchical architecture is justified by integrating the design with the open-source platform EdgeX Foundry, streamlining device management and data flow among interconnected nodes.
A central monitoring device orchestrates system operations, while an acclaimed threat detection model within the server scrutinizes network activities for anomalies. When suspicious actions are detected, the system swiftly alerts other clusters, facilitating a prompt and unified response.
The use of blockchain technology not only enhances the intrusion detection capabilities but also guarantees secure and verifiable data storage. Our findings confirm that the framework delivers secure, optimized IoT services with robust intrusion detection and effective data management. The secure-by-design strategy is both advantageous and practical, offering a superior solution to the pressing security challenges in edge computing.