Advertisement

SIoTFog: Byzantine-resilient IoT fog networking

  • Jian-wen Xu
  • Kaoru Ota
  • Mian-xiong DongEmail author
  • An-feng Liu
  • Qiang Li
Article
  • 12 Downloads

Abstract

The current boom in the Internet of Things (IoT) is changing daily life in many ways, from wearable devices to connected vehicles and smart cities. We used to regard fog computing as an extension of cloud computing, but it is now becoming an ideal solution to transmit and process large-scale geo-distributed big data. We propose a Byzantine fault-tolerant networking method and two resource allocation strategies for IoT fog computing. We aim to build a secure fog network, called “SIoTFog,” to tolerate the Byzantine faults and improve the efficiency of transmitting and processing IoT big data. We consider two cases, with a single Byzantine fault and with multiple faults, to compare the performances when facing different degrees of risk. We choose latency, number of forwarding hops in the transmission, and device use rates as the metrics. The simulation results show that our methods help achieve an efficient and reliable fog network.

Key words

Byzantine fault tolerance Fog computing Resource allocation Internet of Things (IoT) 

CLC number

TP393 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alrawais A, Alhothaily A, Hu CQ, et al., 2017. Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput, 21(2):34–42.  https://doi.org/10.1109/MIC.2017.37 CrossRefGoogle Scholar
  2. Aublin PL, Mokhtar SB, Quéma V, 2013. RBFT: redundant Byzantine fault tolerance. IEEE 33rd Int Conf on Distributed Computing Systems, p.297–306.  https://doi.org/10.1109/ICDCS.2013.53 Google Scholar
  3. Bessani A, Sousa J, Alchieri EEP, 2014. State machine replication for the masses with BFT-SMART. 44th Annual IEEE/IFIP Int Conf on Dependable Systems and Networks, p.355–362.  https://doi.org/10.1109/DSN.2014.43 CrossRefGoogle Scholar
  4. Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13–16.  https://doi.org/10.1145/2342509.2342513 CrossRefGoogle Scholar
  5. Castillo–Cara M, Huaranga–Junco E, Quispe–Montesinos M, et al., 2018. FROG: a robust and green wireless sensor node for fog computing platforms. J Sens, 2018:3406858.  https://doi.org/10.1155/2018/3406858 Google Scholar
  6. Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398–461.  https://doi.org/10.1145/571637.571640 Google Scholar
  7. Driscoll K, Hall B, Sivencrona H, et al., 2003. Byzantine fault tolerance, from theory to reality. LNCS, 2788:235–248.  https://doi.org/10.1007/978-3-540-39878-3_19 Google Scholar
  8. Driscoll K, Hall B, Paulitsch M, et al., 2004. The real Byzantine generals. 23rd Digital Avionics Systems Conf, p.1–11.  https://doi.org/10.1109/DASC.2004.1390734 CrossRefGoogle Scholar
  9. Gao DH, Wang QF, Lei Y, 2017. Distributed fault–tolerant strategy for electric swing system of hybrid excavators under communication errors. Front Inform Technol Electron Eng, 18(7):941–954.  https://doi.org/10.1631/FITEE.1601021 CrossRefGoogle Scholar
  10. Hu PF, Ning HS, Qiu T, et al., 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things. IEEE Internet Things J, 4(5):1143–1155.  https://doi.org/10.1109/JIOT.2017.2659783 CrossRefGoogle Scholar
  11. IHS Markit, 2017. IoT Trend Watch 2017. https://doi.org/ihsmarkit.com/Info/0117/IoT-trend-watch-2017.html [Accessed on Aug. 29, 2018].Google Scholar
  12. Jalali F, Hinton K, Ayre R, et al., 2016. Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun, 34(5):1728–1739.  https://doi.org/10.1109/JSAC.2016.2545559 CrossRefGoogle Scholar
  13. Khosravi A, Kavian YS, 2016. Autonomous fault–diagnosis and decision–making algorithm for determining faulty nodes in distributed wireless networks. Front Inform Technol Electron Eng, 17(9):885–896.  https://doi.org/10.1631/FITEE.1500176 CrossRefGoogle Scholar
  14. Kotla R, Alvisi L, Dahlin M, et al., 2010. Zyzzyva: speculative Byzantine fault tolerance. ACM Trans Comput Syst, 27(4), Article 7.  https://doi.org/10.1145/1658357.1658358 Google Scholar
  15. Lamport L, Shostak R, Pease M, 1982. The Byzantine generals problem. ACM Trans Program Lang Syst, 4(3):382–401.  https://doi.org/10.1145/357172.357176 CrossRefzbMATHGoogle Scholar
  16. Li H, Li P, Guo S, et al., 2014. Byzantine–resilient secure software–defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput, 2(4):436–447.  https://doi.org/10.1109/TCC.2014.2355227 CrossRefGoogle Scholar
  17. Li H, Ota K, Dong MX, 2018. Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Network, 32(1):96–101.  https://doi.org/10.1109/MNET.2018.1700202 CrossRefGoogle Scholar
  18. Liu Z, Dong MX, Zhou H, et al., 2016. Device-to-device assisted video frame recovery for picocell edge users in heterogeneous networks. IEEE Int Conf on Communications, p.1–6.  https://doi.org/10.1109/ICC.2016.7511342 CrossRefGoogle Scholar
  19. Miller A, Xia Y, Croman K, et al., 2016. The honey badger of BFT protocols. Proc ACM SIGSAC Conf on Computer and Communications Security, p.31–42.  https://doi.org/10.1145/2976749.2978399 CrossRefGoogle Scholar
  20. Perera C, Qin YR, Estrella JC, et al., 2017. Fog computing for sustainable smart cities: a survey. ACM Comput Surv, 50(3), Article 32.  https://doi.org/10.1145/3057266 Google Scholar
  21. Reznik A, Arora R, Cannon M, et al., 2017. Developing software for multi-access edge computing. ETSI White Paper 20.Google Scholar
  22. Satyanarayanan M, 2017. The emergence of edge computing. Computer, 50(1):30–39.  https://doi.org/10.1109/MC.2017.9 CrossRefGoogle Scholar
  23. Satyanarayanan M, Bahl P, Cáceres R, et al., 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv Comput, 8(4):14–23.  https://doi.org/10.1109/MPRV.2009.82 CrossRefGoogle Scholar
  24. Stojmenovic I, Wen S, 2014. The fog computing paradigm: scenarios and security issues. Proc Federated Conf on Computer Science and Information Systems, p.1–8.  https://doi.org/10.15439/2014F503 Google Scholar
  25. Tao M, Ota K, Dong M, 2017. Foud: integrating fog and cloud for 5G-enabled V2G networks. IEEE Network, 31(2): 8–13.  https://doi.org/10.1109/MNET.2017.1600213NM Google Scholar
  26. Tao XY, Ota K, Dong MX, et al., 2017. Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wirel Commun Lett, 6(6):774–777.  https://doi.org/10.1109/LWC.2017.2740927 CrossRefGoogle Scholar
  27. Vaquero LM, Rodero–Merino L, 2014. Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev, 44(5): 27–32.  https://doi.org/10.1145/2677046.2677052 CrossRefGoogle Scholar
  28. Wu J, Dong MX, Ota K, et al., 2018a. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Network Serv Manag, 15(1):27–38.  https://doi.org/10.1109/TNSM.2018.2799000 CrossRefGoogle Scholar
  29. Wu J, Dong MX, Ota K, et al., 2018b. FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top Comput, in press.  https://doi.org/10.1109/TETC.2017.2747158 Google Scholar
  30. Yi SH, Li C, Li Q, 2015. A survey of fog computing: concepts, applications and issues. Proc Workshop on Mobile Big Data, p.37–42.  https://doi.org/10.1145/2757384.2757397 Google Scholar
  31. Zeng DZ, Gu L, Yao H, 2018. Towards energy efficient service composition in green energy powered cyber-physical fog systems. Fut Gener Comput Syst, in press.  https://doi.org/10.1016/j.future.2018.01.060 CrossRefGoogle Scholar
  32. Zhang LY, Ding GR, Wu QH, et al., 2015. Byzantine attack and defense in cognitive radio networks: a survey. IEEE Commun Surv Tutor, 17(3):1342–1363.  https://doi.org/10.1109/COMST.2015.2422735 CrossRefGoogle Scholar
  33. Zhang WZ, Lu K, Wang XP, 2018. Versionized process based on non-volatile random-access memory for fine-grained fault tolerance. Front Inform Technol Electron Eng, 19(2): 192–205.  https://doi.org/10.1631/FITEE.1601477 CrossRefGoogle Scholar

Copyright information

© Editorial Office of Journal of Zhejiang University Science and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information and Electronic EngineeringMuroran Institute of TechnologyMuroranJapan
  2. 2.School of Information Science and EngineeringCentral South UniversityChangshaChina
  3. 3.MOE Key Laboratory of Symbol Computation and Knowledge EngineeringJilin UniversityChangchunChina

Personalised recommendations