TY - JOUR
T1 - Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems
AU - Feng, Xinzheng
AU - Wu, Jun
AU - Bashir, Ali Kashif
AU - Li, Jianhua
AU - Shen, Ao
AU - Alshehri, Mohammad Dahman
N1 - Publisher Copyright:
© 2000-2011 IEEE.
PY - 2023/4/1
Y1 - 2023/4/1
N2 - In order to fulfill the requirements of Intelligent Transportation Systems (ITS) on ultra-delay service response, task scheduling for trajectory analysis is being shifted from the data center into the network edge of ITS. Such a decentralized paradigm motivates the computing power of the edge device and makes traditional analysis tasks open to the users around ITS. However, since these ITS users have differentiated identities and roles with differentiated security demands and privacy protection, assigning tasks for different users requires identifying and assessing the vulnerability of edge intelligence entities (EIEs). Otherwise, sensitive tasks assigned to the vulnerable EIEs will extremely increase the security risks of industrial control networks. To solve these problems, this paper proposes a vulnerability-aware task scheduling (VATS) mechanism, which integrates vulnerability assessment and access control. With VATS, secure EIEs can obtain more permissions and join in the privacy-sensitive trajectory analysis task, which is essential to enhance privacy protection at edges and ultimately improve the efficiency of task scheduling. The simulation results demonstrate the validity of the proposed scheme to defend insecure task scheduling like trajectory analysis.
AB - In order to fulfill the requirements of Intelligent Transportation Systems (ITS) on ultra-delay service response, task scheduling for trajectory analysis is being shifted from the data center into the network edge of ITS. Such a decentralized paradigm motivates the computing power of the edge device and makes traditional analysis tasks open to the users around ITS. However, since these ITS users have differentiated identities and roles with differentiated security demands and privacy protection, assigning tasks for different users requires identifying and assessing the vulnerability of edge intelligence entities (EIEs). Otherwise, sensitive tasks assigned to the vulnerable EIEs will extremely increase the security risks of industrial control networks. To solve these problems, this paper proposes a vulnerability-aware task scheduling (VATS) mechanism, which integrates vulnerability assessment and access control. With VATS, secure EIEs can obtain more permissions and join in the privacy-sensitive trajectory analysis task, which is essential to enhance privacy protection at edges and ultimately improve the efficiency of task scheduling. The simulation results demonstrate the validity of the proposed scheme to defend insecure task scheduling like trajectory analysis.
KW - Intelligent transportation system
KW - edge intelligence
KW - task scheduling
KW - trajectory analysis
KW - vulnerability awareness
UR - http://www.scopus.com/inward/record.url?scp=85149407896&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85149407896&partnerID=8YFLogxK
U2 - 10.1109/TITS.2023.3241479
DO - 10.1109/TITS.2023.3241479
M3 - Article
AN - SCOPUS:85149407896
SN - 1524-9050
VL - 24
SP - 4661
EP - 4670
JO - IEEE Transactions on Intelligent Transportation Systems
JF - IEEE Transactions on Intelligent Transportation Systems
IS - 4
ER -