Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Mitigating Rogue Node Attacks in Edge Computing
Beirut Arab University, Lebanon.
Beirut Arab University, Lebanon.
Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).ORCID-id: 0000-0002-3548-2973
Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).ORCID-id: 0000-0001-9194-010X
2019 (engelsk)Inngår i: 2019 2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, IEEE, 2019, s. 193-198, artikkel-id CFP19N76-ARTKonferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a practical solution to the security problem of rogue Fog nodes, and (2) providing the cloud service provider with exclusive control over the security configuration and specification of its leased virtual networks independent of the security mechanisms implemented by the underlying infrastructure provider. The cloud provider dynamically enforces its security policies on the communication at the network edge, therefore circumventing any possible security vulnerabilities in the underlying physical wireless infrastructure. The authentication protocol manages the trusted communication among the mobile client, the infrastructure provider, and the cloud service provider, yet confines the Public-Key Infrastructure (PKI) deployment to solely the infrastructure and cloud providers. This enhances the scalability of the system and reduces the complexity of its security management and configuration. A system testbed is simulated using the Mininet emulator and the Amazon EC2 Cloud.

sted, utgiver, år, opplag, sider
IEEE, 2019. s. 193-198, artikkel-id CFP19N76-ART
Emneord [en]
Cloud Computing, Fog Computing, Mobile Edge Computing, Software Defined Networking, Wireless Network Virtualization, Wireless Security, Authentication, Distributed database systems, Edge computing, Internet protocols, Internet service providers, Public key cryptography, Virtual reality, Virtualization, Wireless networks, Authentication protocols, Infrastructure providers, Network virtualization, Public-key infrastructure, Security configurations, Security vulnerabilities, Wireless infrastructures, Network security
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-77615DOI: 10.1109/MENACOMM46666.2019.8988518Scopus ID: 2-s2.0-85081096435ISBN: 9781728136875 (tryckt)OAI: oai:DiVA.org:kau-77615DiVA, id: diva2:1426221
Konferanse
2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019, 19 November 2019 through 21 November 2019
Tilgjengelig fra: 2020-04-24 Laget: 2020-04-24 Sist oppdatert: 2025-10-17bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Person

Al-Dulaimy, AudayTaheri, Javid

Søk i DiVA

Av forfatter/redaktør
Al-Dulaimy, AudayTaheri, Javid
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric

doi
isbn
urn-nbn
Totalt: 165 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf