2017
DOI: 10.1016/j.simpat.2016.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance

Abstract: Computation offloading has been used and studied extensively in relation to mobile devices. That is because their relatively limited processing power and reliance on a battery render the concept of offloading any processing/energy-hungry tasks to a remote server, cloudlet or cloud infrastructure particularly attractive. However, the mobile device's tasks that are typically offloaded are not time-critical and tend to be one-off. We argue that the concept can be practical also for continuous tasks run on more po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…Additionally, the E/E architecture of the future will not end at the vehicles external borders, but spans to the backend systems that can also provide services to the vehicle. Thus, offloading a vehicles security computations may be a feasible option (e.g., [96], [97]). Furthermore, from a technological perspective more efficient access controls with revocation capabilities, intelligent IDS features for encrypted traffic or high-throughput firewalls for sensory data are an open topic for research.…”
Section: Future Workmentioning
confidence: 99%
“…Additionally, the E/E architecture of the future will not end at the vehicles external borders, but spans to the backend systems that can also provide services to the vehicle. Thus, offloading a vehicles security computations may be a feasible option (e.g., [96], [97]). Furthermore, from a technological perspective more efficient access controls with revocation capabilities, intelligent IDS features for encrypted traffic or high-throughput firewalls for sensory data are an open topic for research.…”
Section: Future Workmentioning
confidence: 99%
“…In vehicular networks, where there is the opportunity for multiple vehicles to collaborate with each other, the data collection and processing can be shared between them and the detection decisions can be taken in a distributed manner. Where the vehicle itself is not powerful enough to perform meaningful IDS onboard and there is no opportunity for collaboration with other vehicles, then the IDS can be run externally, for example by the computing system of a human operator controlling the vehicle remotely or by offloading the IDS processing to a remote cloud infrastructure [13].…”
Section: A Taxonomy Of Vehicle Ids Characteristicsmentioning
confidence: 99%
“…3) Offloaded detection: If being able to self-detect threats is not a requirement and collaboration with neighbouring nodes is not an option, then it may be efficient to offload the detection process onto a remote service ( Figure 5), as in [13]. A key benefit is that access to a more powerful system (e.g., a cloud) means access to more powerful algorithms for intrusion detection, for example based on deep learning, which may otherwise be prohibitive for a resource-constrained vehicle.…”
Section: A Ids Design Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Loukas et al [13] proposed a real-time detection system that used lightweight statistical learning techniques, which used approaches of much greater complexity and detection strength based on deep learning to improve detection accuracy and save energy. Bezemskij et al [14] proposed a method based on Bayesian networks, which could not only determine whether a robot was attacked, but also determine whether the attack came from the cyber-domain or the physical-domain.…”
Section: Related Workmentioning
confidence: 99%