SIoTFog: Byzantine-resilient IoT fog networking

  • Jian-wen Xu
  • Kaoru Ota
  • Mian-xiong DongEmail author
  • An-feng Liu
  • Qiang Li


The current boom in the Internet of Things (IoT) is changing daily life in many ways, from wearable devices to connected vehicles and smart cities. We used to regard fog computing as an extension of cloud computing, but it is now becoming an ideal solution to transmit and process large-scale geo-distributed big data. We propose a Byzantine fault-tolerant networking method and two resource allocation strategies for IoT fog computing. We aim to build a secure fog network, called “SIoTFog,” to tolerate the Byzantine faults and improve the efficiency of transmitting and processing IoT big data. We consider two cases, with a single Byzantine fault and with multiple faults, to compare the performances when facing different degrees of risk. We choose latency, number of forwarding hops in the transmission, and device use rates as the metrics. The simulation results show that our methods help achieve an efficient and reliable fog network.

Key words

Byzantine fault tolerance Fog computing Resource allocation Internet of Things (IoT) 

CLC number



Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Alrawais A, Alhothaily A, Hu CQ, et al., 2017. Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput, 21(2):34–42. CrossRefGoogle Scholar
  2. Aublin PL, Mokhtar SB, Quéma V, 2013. RBFT: redundant Byzantine fault tolerance. IEEE 33rd Int Conf on Distributed Computing Systems, p.297–306. Google Scholar
  3. Bessani A, Sousa J, Alchieri EEP, 2014. State machine replication for the masses with BFT-SMART. 44th Annual IEEE/IFIP Int Conf on Dependable Systems and Networks, p.355–362. CrossRefGoogle Scholar
  4. Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13–16. CrossRefGoogle Scholar
  5. Castillo–Cara M, Huaranga–Junco E, Quispe–Montesinos M, et al., 2018. FROG: a robust and green wireless sensor node for fog computing platforms. J Sens, 2018:3406858. Google Scholar
  6. Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398–461. Google Scholar
  7. Driscoll K, Hall B, Sivencrona H, et al., 2003. Byzantine fault tolerance, from theory to reality. LNCS, 2788:235–248. Google Scholar
  8. Driscoll K, Hall B, Paulitsch M, et al., 2004. The real Byzantine generals. 23rd Digital Avionics Systems Conf, p.1–11. CrossRefGoogle Scholar
  9. Gao DH, Wang QF, Lei Y, 2017. Distributed fault–tolerant strategy for electric swing system of hybrid excavators under communication errors. Front Inform Technol Electron Eng, 18(7):941–954. CrossRefGoogle Scholar
  10. Hu PF, Ning HS, Qiu T, et al., 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things. IEEE Internet Things J, 4(5):1143–1155. CrossRefGoogle Scholar
  11. IHS Markit, 2017. IoT Trend Watch 2017. [Accessed on Aug. 29, 2018].Google Scholar
  12. Jalali F, Hinton K, Ayre R, et al., 2016. Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun, 34(5):1728–1739. CrossRefGoogle Scholar
  13. Khosravi A, Kavian YS, 2016. Autonomous fault–diagnosis and decision–making algorithm for determining faulty nodes in distributed wireless networks. Front Inform Technol Electron Eng, 17(9):885–896. CrossRefGoogle Scholar
  14. Kotla R, Alvisi L, Dahlin M, et al., 2010. Zyzzyva: speculative Byzantine fault tolerance. ACM Trans Comput Syst, 27(4), Article 7. Google Scholar
  15. Lamport L, Shostak R, Pease M, 1982. The Byzantine generals problem. ACM Trans Program Lang Syst, 4(3):382–401. CrossRefzbMATHGoogle Scholar
  16. Li H, Li P, Guo S, et al., 2014. Byzantine–resilient secure software–defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput, 2(4):436–447. CrossRefGoogle Scholar
  17. Li H, Ota K, Dong MX, 2018. Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Network, 32(1):96–101. CrossRefGoogle Scholar
  18. Liu Z, Dong MX, Zhou H, et al., 2016. Device-to-device assisted video frame recovery for picocell edge users in heterogeneous networks. IEEE Int Conf on Communications, p.1–6. CrossRefGoogle Scholar
  19. Miller A, Xia Y, Croman K, et al., 2016. The honey badger of BFT protocols. Proc ACM SIGSAC Conf on Computer and Communications Security, p.31–42. CrossRefGoogle Scholar
  20. Perera C, Qin YR, Estrella JC, et al., 2017. Fog computing for sustainable smart cities: a survey. ACM Comput Surv, 50(3), Article 32. Google Scholar
  21. Reznik A, Arora R, Cannon M, et al., 2017. Developing software for multi-access edge computing. ETSI White Paper 20.Google Scholar
  22. Satyanarayanan M, 2017. The emergence of edge computing. Computer, 50(1):30–39. CrossRefGoogle Scholar
  23. Satyanarayanan M, Bahl P, Cáceres R, et al., 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv Comput, 8(4):14–23. CrossRefGoogle Scholar
  24. Stojmenovic I, Wen S, 2014. The fog computing paradigm: scenarios and security issues. Proc Federated Conf on Computer Science and Information Systems, p.1–8. Google Scholar
  25. Tao M, Ota K, Dong M, 2017. Foud: integrating fog and cloud for 5G-enabled V2G networks. IEEE Network, 31(2): 8–13. Google Scholar
  26. Tao XY, Ota K, Dong MX, et al., 2017. Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wirel Commun Lett, 6(6):774–777. CrossRefGoogle Scholar
  27. Vaquero LM, Rodero–Merino L, 2014. Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev, 44(5): 27–32. CrossRefGoogle Scholar
  28. Wu J, Dong MX, Ota K, et al., 2018a. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Network Serv Manag, 15(1):27–38. CrossRefGoogle Scholar
  29. Wu J, Dong MX, Ota K, et al., 2018b. FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top Comput, in press. Google Scholar
  30. Yi SH, Li C, Li Q, 2015. A survey of fog computing: concepts, applications and issues. Proc Workshop on Mobile Big Data, p.37–42. Google Scholar
  31. Zeng DZ, Gu L, Yao H, 2018. Towards energy efficient service composition in green energy powered cyber-physical fog systems. Fut Gener Comput Syst, in press. CrossRefGoogle Scholar
  32. Zhang LY, Ding GR, Wu QH, et al., 2015. Byzantine attack and defense in cognitive radio networks: a survey. IEEE Commun Surv Tutor, 17(3):1342–1363. CrossRefGoogle Scholar
  33. Zhang WZ, Lu K, Wang XP, 2018. Versionized process based on non-volatile random-access memory for fine-grained fault tolerance. Front Inform Technol Electron Eng, 19(2): 192–205. CrossRefGoogle Scholar

Copyright information

© Editorial Office of Journal of Zhejiang University Science and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information and Electronic EngineeringMuroran Institute of TechnologyMuroranJapan
  2. 2.School of Information Science and EngineeringCentral South UniversityChangshaChina
  3. 3.MOE Key Laboratory of Symbol Computation and Knowledge EngineeringJilin UniversityChangchunChina

Personalised recommendations