Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Mitigating Rogue Node Attacks in Edge Computing
Beirut Arab University, Lebanon.
Beirut Arab University, Lebanon.
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0002-3548-2973
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0001-9194-010X
2019 (English)In: 2019 2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, IEEE, 2019, p. 193-198, article id CFP19N76-ARTConference paper, Published paper (Refereed)
Abstract [en]

In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a practical solution to the security problem of rogue Fog nodes, and (2) providing the cloud service provider with exclusive control over the security configuration and specification of its leased virtual networks independent of the security mechanisms implemented by the underlying infrastructure provider. The cloud provider dynamically enforces its security policies on the communication at the network edge, therefore circumventing any possible security vulnerabilities in the underlying physical wireless infrastructure. The authentication protocol manages the trusted communication among the mobile client, the infrastructure provider, and the cloud service provider, yet confines the Public-Key Infrastructure (PKI) deployment to solely the infrastructure and cloud providers. This enhances the scalability of the system and reduces the complexity of its security management and configuration. A system testbed is simulated using the Mininet emulator and the Amazon EC2 Cloud.

Place, publisher, year, edition, pages
IEEE, 2019. p. 193-198, article id CFP19N76-ART
Keywords [en]
Cloud Computing, Fog Computing, Mobile Edge Computing, Software Defined Networking, Wireless Network Virtualization, Wireless Security, Authentication, Distributed database systems, Edge computing, Internet protocols, Internet service providers, Public key cryptography, Virtual reality, Virtualization, Wireless networks, Authentication protocols, Infrastructure providers, Network virtualization, Public-key infrastructure, Security configurations, Security vulnerabilities, Wireless infrastructures, Network security
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-77615DOI: 10.1109/MENACOMM46666.2019.8988518Scopus ID: 2-s2.0-85081096435ISBN: 9781728136875 (print)OAI: oai:DiVA.org:kau-77615DiVA, id: diva2:1426221
Conference
2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, 19 November 2019 through 21 November 2019
Available from: 2020-04-24 Created: 2020-04-24 Last updated: 2023-06-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Al-Dulaimy, AudayTaheri, Javid

Search in DiVA

By author/editor
Al-Dulaimy, AudayTaheri, Javid
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 129 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf