Virtualization Construction of Security Components of Edge IoT Agent Based on Security Requirements

Journal of Physics: Conference Series(2020)

引用 1|浏览4
暂无评分
摘要
The IoT edge agent is located in the perception layer of the electric power Internet of Things, and uses the edge computing power to realize the data collection, processing and protection management of the Internet of Things terminal equipment. The traditional edge IoT proxy security solution relies heavily on security equipment and a closed service delivery method. The software-defined security-based virtualization technology can separate the hardware platform from the security function, and can separate the required security components according to changes in the field environment. The image is quickly deployed on the edge IoT agent access platform. However, once the security requirements or operating environment change, new security component images need to be regenerated and redeployed to the edge IoT agent hardware platform. The distribution of the image takes a lot of time, which makes the startup process of the container may take a few seconds or a few minutes, so that it cannot respond to and change quickly in a changing application environment. This paper proposes a method for virtualizing the construction of security components of edge IoT agents based on security requirements. This method first creates a core container image with the minimum operating environment of the security components. On this basis, the operating environment requirements and corresponding security requirements are formally modeled Generate a build strategy, use multi-layer container images to build corresponding security components and complete deployment according to the build strategy. Tests show that this method can shorten the deployment time to milliseconds.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要