Mitigating Rogue Node Attacks in Edge Computing
2019 (English)In: 2019 2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, IEEE, 2019, p. 193-198, article id CFP19N76-ARTConference paper, Published paper (Refereed)
Abstract [en]
In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a practical solution to the security problem of rogue Fog nodes, and (2) providing the cloud service provider with exclusive control over the security configuration and specification of its leased virtual networks independent of the security mechanisms implemented by the underlying infrastructure provider. The cloud provider dynamically enforces its security policies on the communication at the network edge, therefore circumventing any possible security vulnerabilities in the underlying physical wireless infrastructure. The authentication protocol manages the trusted communication among the mobile client, the infrastructure provider, and the cloud service provider, yet confines the Public-Key Infrastructure (PKI) deployment to solely the infrastructure and cloud providers. This enhances the scalability of the system and reduces the complexity of its security management and configuration. A system testbed is simulated using the Mininet emulator and the Amazon EC2 Cloud.
Place, publisher, year, edition, pages
IEEE, 2019. p. 193-198, article id CFP19N76-ART
Keywords [en]
Cloud Computing, Fog Computing, Mobile Edge Computing, Software Defined Networking, Wireless Network Virtualization, Wireless Security, Authentication, Distributed database systems, Edge computing, Internet protocols, Internet service providers, Public key cryptography, Virtual reality, Virtualization, Wireless networks, Authentication protocols, Infrastructure providers, Network virtualization, Public-key infrastructure, Security configurations, Security vulnerabilities, Wireless infrastructures, Network security
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-77615DOI: 10.1109/MENACOMM46666.2019.8988518Scopus ID: 2-s2.0-85081096435ISBN: 9781728136875 (print)OAI: oai:DiVA.org:kau-77615DiVA, id: diva2:1426221
Conference
2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, 19 November 2019 through 21 November 2019
2020-04-242020-04-242023-06-26Bibliographically approved