A Secure Recommender System Model for Service Placement in Wireless Networks

被引:0
|
作者
Gashi L. [1 ]
Luma A. [1 ]
Snopçe H. [1 ]
Januzaj Y. [2 ]
机构
[1] South East European University, Tetovo
[2] University of Business “Haxhi Zeka”, Peja
关键词
CIA triad; fog and edge clustering; mobile communication; networks service placement; wireless networks;
D O I
10.3991/ijim.v17i11.37369
中图分类号
学科分类号
摘要
Edge or fog computing is being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, allowed other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the cybersecurity aspects. Reviewing the related work on service placement and clustering, we have seen that no technique could be used as a template for finding the most valuable node about its cybersecurity metrics when multi-tier computing networks are used. So, we have developed a baseline method of a solution that fulfills the cybersecurity requirements converging with a proposed integrated multi-tier wireless networking model. This is achieved by enhancing the K-means algorithm with added processing steps. Initially, Kmeans clustering is executed, then three more specific parameters will define the cluster members' status, respectively about its confidentiality, integrity, and availability. The summarized results provided at the end of the process determine the most trusted cluster member within a cluster of 50 networked nodes which is recommended to serve as a node for placing securely the requested service. Results show that our proposal stands and that further studies based on this approach have enough arguments to be researched. © 2023, International Journal of Interactive Mobile Technologies. All Rights Reserved.
引用
收藏
页码:115 / 130
页数:15
相关论文
共 50 条
  • [1] Secure feedback service in wireless sensor networks
    Ma, Di
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 116 - 128
  • [2] Secure overlay for service centric wireless sensor networks
    Hof, HJ
    Blass, EO
    Zitterbart, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 125 - 138
  • [3] A secure service architecture to support wireless vehicular networks
    Coronado E.
    Cherkaoui S.
    International Journal of Autonomous and Adaptive Communications Systems, 2010, 3 (02) : 136 - 158
  • [4] Designing a self-organised system for service substitution and placement in wireless sensor networks
    Asghari, S. A.
    Zadeh, H. G.
    Taheri, H.
    Pedram, H.
    IET WIRELESS SENSOR SYSTEMS, 2011, 1 (04) : 200 - 205
  • [5] A distributed collaborative trust service recommender system for secure cloud computing
    Benjula Anbu Malar, M. B.
    Prabhu, J.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12):
  • [6] SCAN: A secure service directory for service-centric wireless sensor networks
    Hof, HJ
    Zitterbart, M
    COMPUTER COMMUNICATIONS, 2005, 28 (13) : 1517 - 1522
  • [7] An efficient privacy-preserving recommender system in wireless networks
    Luo, Junwei
    Yi, Xun
    Han, Fengling
    Yang, Xuechao
    WIRELESS NETWORKS, 2024, 30 (06) : 4949 - 4960
  • [8] A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things
    Zhou W.
    Yu B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (07): : 1393 - 1408
  • [9] Optimized Handoff and Secure Roaming Model for Wireless Networks
    Mathonsi, Topside E.
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 134 - 139
  • [10] A secure multimedia system in emerging wireless home networks
    Taesombut, N
    Huang, R
    Rangan, VP
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 76 - 88