Abstract

In order to fulfill the requirements of Intelligent Transportation Systems (ITS) on ultra-delay service response, task scheduling for trajectory analysis is being shifted from the data center into the network edge of ITS. Such a decentralized paradigm motivates the computing power of the edge device and makes traditional analysis tasks open to the users around ITS. However, since these ITS users have differentiated identities and roles with differentiated security demands and privacy protection, assigning tasks for different users requires identifying and assessing the vulnerability of edge intelligence entities (EIEs). Otherwise, sensitive tasks assigned to the vulnerable EIEs will extremely increase the security risks of industrial control networks. To solve these problems, this paper proposes a vulnerability-aware task scheduling (VATS) mechanism, which integrates vulnerability assessment and access control. With VATS, secure EIEs can obtain more permissions and join in the privacy-sensitive trajectory analysis task, which is essential to enhance privacy protection at edges and ultimately improve the efficiency of task scheduling. The simulation results demonstrate the validity of the proposed scheme to defend insecure task scheduling like trajectory analysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call