• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Data contamination detection and defense algorithms for IoT edge computing

Vol. 19, No. 6, June 30, 2025
10.3837/tiis.2025.06.013, Download Paper (Free):

Abstract

Edge Computing (EC) as the essence is that the cloud server distributes computing tasks to the node servers linked to it. The complex environment awareness supported by server cluster computing driven by big data is a hot research and infrastructure focus for the current and future period. To address the challenge of limited computational resources in edge nodes within edge computing systems, as well as the difficulty in accurately detecting service failures triggered by malicious attacks from other edge nodes, this paper proposes an improved Efficient edge computing Secure Deep Learning (DL) algorithm (Efficient edge computing Secure Deep Learning Method Based on Data Pollution, DL) for data pollution. This paper proposes an improved Efficient edge computing Secure Deep Learning Method Based on Data Pollution (EMD) algorithm to solve the problem of fluctuating and inaccurate computing results of edge nodes due to their poor robustness, data distortion or mild qualitative changes. The network is trained by adding Gaussian Noise (GN) to the randomly selected batch samples, using the expanded data set, and by incorporating the newly introduced compound loss function from this paper, the challenging-to-optimize triplet method can be effectively trained. This enables the network to have a broader data fitting and prediction capability, and this addresses the issue of systemic failure, which arises when executing accurate operations at the edge nodes becomes challenging due to significant data corruption. In addition, an accelerated convergence function is proposed in this paper to accelerate the convergence speed of network training. The algorithm's precision improved by 2.56%, 4.26%, and 6.83% on the Cifar10 dataset compared to the baseline algorithm. On the 20% contaminated Cifar10 dataset, its precision increased by 2.43%, 4.24%, and 6.93% relative to the comparison algorithm. The results of the simulation indicate that the algorithm proposed in this paper is more effective at detecting both noisy-contaminated samples and those with random labeling errors, and the algorithm can achieve the best results within the specified training batches.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
M. Liu, M. Lv, Y. Guo, "Data contamination detection and defense algorithms for IoT edge computing," KSII Transactions on Internet and Information Systems, vol. 19, no. 6, pp. 2008-2029, 2025. DOI: 10.3837/tiis.2025.06.013.

[ACM Style]
Miao Liu, Maojia Lv, and Yaru Guo. 2025. Data contamination detection and defense algorithms for IoT edge computing. KSII Transactions on Internet and Information Systems, 19, 6, (2025), 2008-2029. DOI: 10.3837/tiis.2025.06.013.

[BibTeX Style]
@article{tiis:102782, title="Data contamination detection and defense algorithms for IoT edge computing", author="Miao Liu and Maojia Lv and Yaru Guo and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2025.06.013}, volume={19}, number={6}, year="2025", month={June}, pages={2008-2029}}