DOI QR코드

DOI QR Code

블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats

  • 정윤수 (목원대학교 게임소프트웨어공학과)
  • 투고 : 2024.02.27
  • 심사 : 2024.03.27
  • 발행 : 2024.04.30

초록

지난 몇 년 동안 5G와 같은 새로운 저 지연 통신 프로토콜을 기반으로 IoT 엣지가 등장하기 시작했다. 그러나, IoT 엣지는 막대한 이점에도 불구하고, 새로운 보완 위협을 초래하여 이를 해결하기 위한 새로운 보안 솔루션이 필요하다. 본 논문에서는 IoT 시스템을 보완하는 클라우드 환경기반의 IoT 엣지 아키텍처 모델을 제안한다. 제안 모델은 IoT 엣지 장치에서 추출한 네트워크 트래픽 데이터를 기계 학습에 작용하여 사전에 보안 위협을 예방한다. 또한, 제안 모델은 로컬 노드에서 보안 데이터 일부를 할당함으로써 액세스 네트워크(엣지)에서의 부하 및 보안을 보장한다. 제안 모델은 IoT 엣지 환경 중 로컬 노드에 데이터 처리 및 관리의 일부 기능을 할당함으로써 액세스 네트워크(엣지)의 부하를 더욱 줄이는 동시에 취약 부분을 안전하게 보호한다. 제안 모델은 다양한 IoT 기능을 네임 서비스로 가상화하고, 필요에 따라 하드웨어 기능과 충분한 계산 리소스를 로컬 노드에 배포한다.

Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

키워드

참고문헌

  1. I.Yen, F.Bastani, N.Solanki, Y.Huang and S.Hwang, "Trustworthy Computing in the Dynamic IoT Cloud," 2018 IEEE International Conference on information Reuse and Integration (IRI), pp.411-418, 2018.
  2. S.M.Ali, A.S.Elameer and M.M.Jaber, "IoT network security using autoencoder deep neural network and channel access algorithm," Journal of Intelligent Systems, Vol.31, No.1, pp.95-103, 2022. https://doi.org/10.1515/jisys-2021-0173
  3. M.A.Ferrag, O.Friha, D.Hamouda, L.Maglaras and H.Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning," IEEE Access, Vol.10, pp.40281-40306, 2022. https://doi.org/10.1109/ACCESS.2022.3165809
  4. S.Sachdeva and A.Ali, "Machine learning with digital forensics for attack classification in cloud network environment," International Journal of System Assurance Engineering and Management, Vol.13, No.1, pp.156-165, 2022. https://doi.org/10.1007/s13198-021-01323-4
  5. K.Sha, R.Errabelly, W.Wei, T.A.Yang and Z.Wang, "EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security," 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp.81-88, 2017.
  6. R.Sachdev, "Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments," 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), pp.341-346, 2020.
  7. P.M.Shakeel, S.Baskar, H.Fouad, G.Manogaran, V.Saravanan, and C.E.Montenegro-Marin, "Internet of things forensic data analysis using machine learning to identify roots of data scavenging," Future Generation Computer Systems, Vol.115, pp.756-768, 2021. https://doi.org/10.1016/j.future.2020.10.001
  8. J.Wang, S.Wang, L.Wang, W.Shao, S.Xu and S.Zhang, "A Blockchain and Edge Computing Based Public Audit Scheme for Cloud Storage," 2022 41st Chinese Control Conference (CCC), pp.7466-7470, 2022.
  9. L.Liu and K.Omote, "Efficient Authentication System Based On Blockchain Using eID card," 2023 IEEE International Conference on Blockchain (Blockchain), pp.166-171, 2023.
  10. Y.C.Chang, Y.S.Lin, A.K.Sangaiahc and H.T.Wu, "A Private Blockchain System based on Zero Trust Architecture," 2024 26th International Conference on Advanced Communications Technology (ICACT), pp.143-146, 2024.
  11. N.Almolhis, A.M.Alashjaee, S.Duraibi, F.Alqahtani and A.N.Moussa, "The Security Issues in IoT - Cloud: A Review," 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp.191-196, 2020.
  12. I.Mohiuddin and A.Almogren, "Security Challenges and Strategies for the IoT in Cloud Computing," 2020 11th International Conference on Information and Communication Systems (ICICS), pp.367-372, 2020.
  13. V.Hassija, V.Chamola, V.Saxena, D.Jain, P.Goyal and B.Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE Access, Vol.7, pp.82721-82743, 2019. https://doi.org/10.1109/ACCESS.2019.2924045
  14. A.Rahman, M.J.Islam, M.S.I. Khan, S.Kabir, A.I.Pritom and M.R.Karim, "Block-SDoTCloud: Enhancing Security of Cloud Storage through Blockchain-based SDN in IoT Network," 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), pp.1-6, 2020.