SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

被引:0
|
作者
Ye, Jiehao [1 ]
Cheng, Wen [1 ]
Liu, Xiaolong [1 ]
Zhu, Wenyi [1 ]
Wu, Xuan'ang [1 ]
Shen, Shigen [1 ]
机构
[1] Huzhou Univ, Sch Informat Engn, Huzhou 313000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 02期
关键词
Edge computing; Internet of Things; malicious software; propagation model; heterogeneity; PROPAGATION MODEL; SPREADING MODEL; DYNAMICS; TRANSMISSION; STRATEGIES;
D O I
10.32604/cmc.2024.049985
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing -enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise data confidentiality and network service availability. Facing this situation, we put forward an epidemiology -based susceptible -curb -infectious -removed -dead (SCIRD) model. Then, we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations. Additionally, we establish the presence of equilibrium states in the SCIRD model. Furthermore, we conduct an analysis of the model's stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing -enabled IoT (ECIoT) networks. Lastly, we validate the efficacy and superiority of the SCIRD model through MATLAB simulations. These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks. The experimental results indicate that the theoretical SCIRD model has instructive significance, deeply revealing the principles of malicious software propagation in ECIoT networks. This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold, which lays the foundation for building more secure and reliable ECIoT networks.
引用
收藏
页码:2743 / 2769
页数:27
相关论文
共 50 条
  • [21] Interference Aware Cooperative Routing for Edge Computing-Enabled 5G Networks
    Waqas, Abdullah
    Mahmood, Hasan
    Saeed, Nasir
    IEEE Sensors Journal, 2022, 22 (04): : 3777 - 3784
  • [22] Energy-Efficient Cooperation in Mobile Edge Computing-Enabled Cognitive Radio Networks
    Liu, Boyang
    Wang, Jin
    Ma, Shuai
    Zhou, Fuhui
    MA, Yujiao
    Lu, Guangyue
    IEEE ACCESS, 2019, 7 : 45382 - 45394
  • [23] Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks
    Xu, Qichao
    Su, Zhou
    Zheng, Qinghua
    Luo, Minnan
    Dong, Bo
    Zhang, Kuan
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4536 - 4546
  • [24] Information Age-Based Task Splitting Scheme for Edge Computing-Enabled Networks
    Kim, Jinwoong
    Lee, Jemin
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2025, 14 (02) : 270 - 274
  • [25] Joint Power Control and Computing Association for Delay Minimization in Edge Computing-Enabled Smart Grid Networks
    Yu, Junhao
    Xu, Min
    Jin, Xin
    Cheng, Yuanyuan
    Cheng, Kang
    Wang, Peng
    2024 6TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM, AEEES 2024, 2024, : 716 - 720
  • [26] An Efficient Resource Allocation Scheme With Uncertain Network Status in Edge Computing-Enabled Networks
    Cheng, Yuxia
    Liang, Chengchao
    Chen, Qianbin
    Yu, F. Richard
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1249 - 1263
  • [27] Energy-efficient Computation Task Splitting for Edge Computing-enabled Vehicular Networks
    Cho, Hewon
    Cui, Ying
    Lee, Jemin
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
  • [28] Interference Aware Cooperative Routing for Edge Computing-Enabled 5G Networks
    Waqas, Abdullah
    Mahmood, Hasan
    Saeed, Nasir
    IEEE SENSORS JOURNAL, 2022, 22 (04) : 3777 - 3784
  • [29] Blockchain Enabled IoT Edge Computing
    Mendki, Pankaj
    2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), 2019, : 66 - 69
  • [30] Edge Computing-Enabled Train Fusion Positioning: Modeling and Analysis
    Yin, Hao
    Song, Haifeng
    Wu, Ruichao
    Zhou, Min
    Deng, Zixing
    Dong, Hairong
    MATHEMATICS, 2025, 13 (06)