Abstract
The current boom in the Internet of Things (IoT) is changing daily life in many ways, from wearable devices to connected vehicles and smart cities. We used to regard fog computing as an extension of cloud computing, but it is now becoming an ideal solution to transmit and process large-scale geo-distributed big data. We propose a Byzantine fault-tolerant networking method and two resource allocation strategies for IoT fog computing. We aim to build a secure fog network, called “SIoTFog,” to tolerate the Byzantine faults and improve the efficiency of transmitting and processing IoT big data. We consider two cases, with a single Byzantine fault and with multiple faults, to compare the performances when facing different degrees of risk. We choose latency, number of forwarding hops in the transmission, and device use rates as the metrics. The simulation results show that our methods help achieve an efficient and reliable fog network.
Similar content being viewed by others
References
Alrawais A, Alhothaily A, Hu CQ, et al., 2017. Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput, 21(2):34–42. https://doi.org/10.1109/MIC.2017.37
Aublin PL, Mokhtar SB, Quéma V, 2013. RBFT: redundant Byzantine fault tolerance. IEEE 33rd Int Conf on Distributed Computing Systems, p.297–306. https://doi.org/10.1109/ICDCS.2013.53
Bessani A, Sousa J, Alchieri EEP, 2014. State machine replication for the masses with BFT-SMART. 44th Annual IEEE/IFIP Int Conf on Dependable Systems and Networks, p.355–362. https://doi.org/10.1109/DSN.2014.43
Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13–16. https://doi.org/10.1145/2342509.2342513
Castillo–Cara M, Huaranga–Junco E, Quispe–Montesinos M, et al., 2018. FROG: a robust and green wireless sensor node for fog computing platforms. J Sens, 2018:3406858. https://doi.org/10.1155/2018/3406858
Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398–461. https://doi.org/10.1145/571637.571640
Driscoll K, Hall B, Sivencrona H, et al., 2003. Byzantine fault tolerance, from theory to reality. LNCS, 2788:235–248. https://doi.org/10.1007/978-3-540-39878-3_19
Driscoll K, Hall B, Paulitsch M, et al., 2004. The real Byzantine generals. 23rd Digital Avionics Systems Conf, p.1–11. https://doi.org/10.1109/DASC.2004.1390734
Gao DH, Wang QF, Lei Y, 2017. Distributed fault–tolerant strategy for electric swing system of hybrid excavators under communication errors. Front Inform Technol Electron Eng, 18(7):941–954. https://doi.org/10.1631/FITEE.1601021
Hu PF, Ning HS, Qiu T, et al., 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things. IEEE Internet Things J, 4(5):1143–1155. https://doi.org/10.1109/JIOT.2017.2659783
IHS Markit, 2017. IoT Trend Watch 2017. https://doi.org/ihsmarkit.com/Info/0117/IoT-trend-watch-2017.html [Accessed on Aug. 29, 2018].
Jalali F, Hinton K, Ayre R, et al., 2016. Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun, 34(5):1728–1739. https://doi.org/10.1109/JSAC.2016.2545559
Khosravi A, Kavian YS, 2016. Autonomous fault–diagnosis and decision–making algorithm for determining faulty nodes in distributed wireless networks. Front Inform Technol Electron Eng, 17(9):885–896. https://doi.org/10.1631/FITEE.1500176
Kotla R, Alvisi L, Dahlin M, et al., 2010. Zyzzyva: speculative Byzantine fault tolerance. ACM Trans Comput Syst, 27(4), Article 7. https://doi.org/10.1145/1658357.1658358
Lamport L, Shostak R, Pease M, 1982. The Byzantine generals problem. ACM Trans Program Lang Syst, 4(3):382–401. https://doi.org/10.1145/357172.357176
Li H, Li P, Guo S, et al., 2014. Byzantine–resilient secure software–defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput, 2(4):436–447. https://doi.org/10.1109/TCC.2014.2355227
Li H, Ota K, Dong MX, 2018. Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Network, 32(1):96–101. https://doi.org/10.1109/MNET.2018.1700202
Liu Z, Dong MX, Zhou H, et al., 2016. Device-to-device assisted video frame recovery for picocell edge users in heterogeneous networks. IEEE Int Conf on Communications, p.1–6. https://doi.org/10.1109/ICC.2016.7511342
Miller A, Xia Y, Croman K, et al., 2016. The honey badger of BFT protocols. Proc ACM SIGSAC Conf on Computer and Communications Security, p.31–42. https://doi.org/10.1145/2976749.2978399
Perera C, Qin YR, Estrella JC, et al., 2017. Fog computing for sustainable smart cities: a survey. ACM Comput Surv, 50(3), Article 32. https://doi.org/10.1145/3057266
Reznik A, Arora R, Cannon M, et al., 2017. Developing software for multi-access edge computing. ETSI White Paper 20.
Satyanarayanan M, 2017. The emergence of edge computing. Computer, 50(1):30–39. https://doi.org/10.1109/MC.2017.9
Satyanarayanan M, Bahl P, Cáceres R, et al., 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv Comput, 8(4):14–23. https://doi.org/10.1109/MPRV.2009.82
Stojmenovic I, Wen S, 2014. The fog computing paradigm: scenarios and security issues. Proc Federated Conf on Computer Science and Information Systems, p.1–8. https://doi.org/10.15439/2014F503
Tao M, Ota K, Dong M, 2017. Foud: integrating fog and cloud for 5G-enabled V2G networks. IEEE Network, 31(2): 8–13. https://doi.org/10.1109/MNET.2017.1600213NM
Tao XY, Ota K, Dong MX, et al., 2017. Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wirel Commun Lett, 6(6):774–777. https://doi.org/10.1109/LWC.2017.2740927
Vaquero LM, Rodero–Merino L, 2014. Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev, 44(5): 27–32. https://doi.org/10.1145/2677046.2677052
Wu J, Dong MX, Ota K, et al., 2018a. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Network Serv Manag, 15(1):27–38. https://doi.org/10.1109/TNSM.2018.2799000
Wu J, Dong MX, Ota K, et al., 2018b. FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top Comput, in press. https://doi.org/10.1109/TETC.2017.2747158
Yi SH, Li C, Li Q, 2015. A survey of fog computing: concepts, applications and issues. Proc Workshop on Mobile Big Data, p.37–42. https://doi.org/10.1145/2757384.2757397
Zeng DZ, Gu L, Yao H, 2018. Towards energy efficient service composition in green energy powered cyber-physical fog systems. Fut Gener Comput Syst, in press. https://doi.org/10.1016/j.future.2018.01.060
Zhang LY, Ding GR, Wu QH, et al., 2015. Byzantine attack and defense in cognitive radio networks: a survey. IEEE Commun Surv Tutor, 17(3):1342–1363. https://doi.org/10.1109/COMST.2015.2422735
Zhang WZ, Lu K, Wang XP, 2018. Versionized process based on non-volatile random-access memory for fine-grained fault tolerance. Front Inform Technol Electron Eng, 19(2): 192–205. https://doi.org/10.1631/FITEE.1601477
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the JSPS KAKENHI, Japan (No. JP16K00117) and the KDDI Foundation, Japan
Rights and permissions
About this article
Cite this article
Xu, Jw., Ota, K., Dong, Mx. et al. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf Technol Electronic Eng 19, 1546–1557 (2018). https://doi.org/10.1631/FITEE.1800519
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1800519