首页> 外文会议>IEEE Middle East and North Africa Communications Conference >Mitigating Rogue Node Attacks in Edge Computing
【24h】

Mitigating Rogue Node Attacks in Edge Computing

机译:缓解Rogue节点攻击边缘计算

获取原文

摘要

In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a practical solution to the security problem of rogue Fog nodes, and (2) providing the cloud service provider with exclusive control over the security configuration and specification of its leased virtual networks independent of the security mechanisms implemented by the underlying infrastructure provider. The cloud provider dynamically enforces its security policies on the communication at the network edge, therefore circumventing any possible security vulnerabilities in the underlying physical wireless infrastructure. The authentication protocol manages the trusted communication among the mobile client, the infrastructure provider, and the cloud service provider, yet confines the Public-Key Infrastructure (PKI) deployment to solely the infrastructure and cloud providers. This enhances the scalability of the system and reduces the complexity of its security management and configuration. A system testbed is simulated using the Mininet emulator and the Amazon EC2 Cloud.
机译:在这项工作中,我们使用软件定义的网络平台和无线网络虚拟化呈现了用于边缘计算的安全认证协议。所提出的协议的主要贡献在于:(1)设计和实施流氓雾节点的安全问题的实际解决方案,(2)提供云服务提供商,通过对其租用虚拟的安全配置和规范进行独占控制网络独立于基础架构提供商实现的安全机制。云提供商在网络边缘的通信中动态强制执行其安全策略,从而避免了底层物理无线基础架构中的任何可能的安全漏洞。身份验证协议管理移动客户端,基础架构提供商和云服务提供商之间的可信通信,但仅限于基础设施和云提供商的公钥基础架构(PKI)部署。这提高了系统的可扩展性并降低了安全管理和配置的复杂性。使用MinInet仿真器和Amazon EC2云模拟系统测试用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号