Open Access iconOpen Access

ARTICLE

crossmark

SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

by Jiehao Ye, Wen Cheng, Xiaolong Liu, Wenyi Zhu, Xuan’ang Wu, Shigen Shen*

School of Information Engineering, Huzhou University, Huzhou, 313000, China

* Corresponding Author: Shigen Shen. Email: email

Computers, Materials & Continua 2024, 79(2), 2743-2769. https://doi.org/10.32604/cmc.2024.049985

Abstract

The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing-enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise data confidentiality and network service availability. Facing this situation, we put forward an epidemiology-based susceptible-curb-infectious-removed-dead (SCIRD) model. Then, we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations. Additionally, we establish the presence of equilibrium states in the SCIRD model. Furthermore, we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT (ECIoT) networks. Lastly, we validate the efficacy and superiority of the SCIRD model through MATLAB simulations. These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks. The experimental results indicate that the theoretical SCIRD model has instructive significance, deeply revealing the principles of malicious software propagation in ECIoT networks. This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold, which lays the foundation for building more secure and reliable ECIoT networks.

Keywords


Cite This Article

APA Style
Ye, J., Cheng, W., Liu, X., Zhu, W., Wu, X. et al. (2024). SCIRD: revealing infection of malicious software in edge computing-enabled iot networks. Computers, Materials & Continua, 79(2), 2743-2769. https://doi.org/10.32604/cmc.2024.049985
Vancouver Style
Ye J, Cheng W, Liu X, Zhu W, Wu X, Shen S. SCIRD: revealing infection of malicious software in edge computing-enabled iot networks. Comput Mater Contin. 2024;79(2):2743-2769 https://doi.org/10.32604/cmc.2024.049985
IEEE Style
J. Ye, W. Cheng, X. Liu, W. Zhu, X. Wu, and S. Shen, “SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks,” Comput. Mater. Contin., vol. 79, no. 2, pp. 2743-2769, 2024. https://doi.org/10.32604/cmc.2024.049985



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 603

    View

  • 231

    Download

  • 0

    Like

Share Link