4.8 Article

A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 16, Issue 9, Pages 6083-6091

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2019.2955152

Keywords

Cloud computing; Sensors; Edge computing; Quality of service; Security; Monitoring; Reliability; Edge computing; Industrial Internet of Things (IIoT); sensor-cloud; service selection; trust evaluation

Funding

  1. Open Fund of Key Laboratory of Data Mining and Intelligent Recommendation, Fujian Province University [DM201902]
  2. General Projects of Social Sciences in Fujian Province [FJ2018B038]
  3. National Natural Science Foundation of China (NSFC) [61872154, 61572435, 61772148, 61672441]
  4. Fujian Provincial Outstanding Youth Scientific Research Personnel Training Program
  5. Natural Science Foundation of Fujian Province of China [2018J01092]

Ask authors/readers for more resources

Under the combination of Internet-of-Things (IoT) technology and traditional industry, the Industrial IoT (IIoT) came into being and received wide attention from all walks of life. With the increase of the number of IIOT devices in industrial environments, security threats, and quality of service (QoS) issues increase drastically. Internal attack is one type of important security threat that makes service environment worse and less reliable. However, there is no unified and fine-grained trust evaluation mechanism to deal with the threats of internal attack and improve QoS of IIoT. To this end, a unified trustworthy environment based on edge computing is established and maintained, which can timely detect malicious service providers and service consumers, filter unreal information, and recommend credible service providers. Edge computing is introduced as an effective service access point, since it supports collecting service records to perform trust evaluations. Moreover, a service selection method is designed to choose the corresponding trustworthy and reliable service providers based on the trust evaluation and the recording criterion, which has distinctive advantages in the succinct trust management, convenient searching service, and accurate service matching. Experiments validated the feasibility of the proposed trustworthy environment.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available