Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Executing mobile edge functions in the cloud-edge continuum: analyzing threats to location integrity
Cetic Research Center, Charleroi, Belgium.
Cetic Research Center, Charleroi, Belgium.
Cetic Research Center, Charleroi, Belgium.
Cetic Research Center, Charleroi, Belgium.
Show others and affiliations
2025 (English)In: 2025 12th International Conference on Future Internet of Things and Cloud (FiCloud), Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 18-25Conference paper, Published paper (Refereed)
Abstract [en]

With the exponential growth of edge devices, the cloud edge continuum provides a natural evolution to the centralised cloud architecture to overcome the bottlenecks created by the growing data that devices generate. Resource constrained edge devices need to be able to offload computational tasks to the cloud edge continuum. Providing resources located at the edge, close to resource-constrained devices, allows devices to offload on demand potentially complex functions with low latency and response time requirements. The COGNIT framework introduces the novel concept of function as a services (FaaS) at the edge and novel AI techniques for cloud-edge management. In this paper, we show how the novel edge FaaS model can be used to offload critical security functions from edge devices and enable them to protect themselves even though they don't have the resources for such protection. The paper's main contribution is to show how the edge FaaS model enables to design multi-layer protection models between edge devices and the cloud-edge continuum AI-based orchestrator. In this model the edge device provides a first layer of defense using application knowledge to protect itself whereas the AI-based orchestrator provides a second layer of defense that is more generic because it does not know much about the edge application. The layered protection model is illustrated and validated on a cybersecurity case study where AI-based anomaly detection is deployed at the edge to secure mobile devices and detect anomalies as early and quickly as possible. This second contribution of the paper shows how continuous security anomaly detection can be designed as multiple functions that are triggered by monitored events to provide continuous detection at the edge for all events.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025. p. 18-25
Series
International Conference on Future Internet of Things and Cloud (FiCloud), E-ISSN 2996-1017
Keywords [en]
Anomaly detection, Edge Computing, FaaS, Mobile Device, Security architecture, Threat modelling
National Category
Computer Sciences Communication Systems
Identifiers
URN: urn:nbn:se:umu:diva-248361DOI: 10.1109/FiCloud66139.2025.00010Scopus ID: 2-s2.0-105021954266ISBN: 9798331554378 (electronic)ISBN: 9798331554385 (print)OAI: oai:DiVA.org:umu-248361DiVA, id: diva2:2027695
Conference
12th International Conference on Future Internet of Things and Cloud, FiCloud 2025, Istanbul, Turkiye, 11-13 August, 2025
Funder
EU, Horizon Europe, 101092711Available from: 2026-01-13 Created: 2026-01-13 Last updated: 2026-01-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Bhuyan, MonowarTownend, Paul

Search in DiVA

By author/editor
Bhuyan, MonowarTownend, Paul
By organisation
Department of Computing Science
Computer SciencesCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 25 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf