15Distributed Computing for Internet of Things Under Adversarial Environments
Gowri Sankar Ramachandran1, Luis A. Garcia2, and Bhaskar Krishnamachari3
1School of Computer Science, Queensland University of Technology, Brisbane, Queensland, Australia
2Information Sciences Institute, University of Southern California, Marina Del Rey, CA, USA
3Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA
Abstract
IoT applications of increasing complexity for many applications require in‐network processing of data from many sources, leveraging hybrid edge and cloud computing resources. In battlefield and defence settings, IoT applications also demand dependable operations, guaranteeing security and resource availability. It is challenging to orchestrate distributed computing for these applications, identifying the optimal placement of computing tasks in the face of dynamics in resource availability and network conditions. It becomes even more challenging to enable distributed computing in an adversarial environment where the data being processed as well as meta‐data about resource availability could be manipulated, and the computing and networking resources may be compromised. Therefore, it is essential to develop frameworks to orchestrate distributed computing challenges in battlefield IoT networks. We survey the challenges and the existing state of the art, present some solutions, and identify key directions for future work.
15.1 ...
Get IoT for Defense and National Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.