Paper
11 October 2023 Lightweight blockchain-based technique for detection and prevention man in the middle attacks in mobile edge computing environment
Jadoon Zeeshan, Tong Liu
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 128001T (2023) https://doi.org/10.1117/12.3004285
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
In the last few years, the Internet of Things (IoT) has become important part of our lives and its influence is expected to exponentially increase in the next years. Computer systems and applications are improved day by day and with the advancement in such area it gives birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. Mainly it is knowing as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. Cloud, edge and fog computing added more flavors in terms of better throughput and low latency in ease of accessing data. Edge computing refers to a distributed open platform which helps off-loading tasks and processing of cloud at edge of the network. The edge serves as a bridge between the digital and physical worlds making gateways, systems and services smart and efficient. Due to the exponential growth of IoT produced data, its complexity is also expected to increase and raises need for innovation for improved security in Mobile Edge Computing (MEC) environment. This research is conducted to propose a lightweight Blockchain solution using private/ public keys and employing shading for off-loading computation intensive tasks at MEC. Inter-Planetary File System (IPFS) database has been used to offload computational task from edge servers. Proposed technique is implemented using Java Script and Node.JS and simulated through Visual Studio Code and results are compared with other lightweight encryption algorithms proposed for IoT.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Jadoon Zeeshan and Tong Liu "Lightweight blockchain-based technique for detection and prevention man in the middle attacks in mobile edge computing environment", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 128001T (11 October 2023); https://doi.org/10.1117/12.3004285
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Blockchain

Computer security

Internet of things

Power consumption

Computing systems

Cyberattacks

Back to Top