Mitigating rogue node attacks in edge computing

  • Maha Shamseddine
  • , Wassim Itani
  • , Auday Al-Dulaimy
  • , Javid Taheri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a practical solution to the security problem of rogue Fog nodes, and (2) providing the cloud service provider with exclusive control over the security configuration and specification of its leased virtual networks independent of the security mechanisms implemented by the underlying infrastructure provider. The cloud provider dynamically enforces its security policies on the communication at the network edge, therefore circumventing any possible security vulnerabilities in the underlying physical wireless infrastructure. The authentication protocol manages the trusted communication among the mobile client, the infrastructure provider, and the cloud service provider, yet confines the Public-Key Infrastructure (PKI) deployment to solely the infrastructure and cloud providers. This enhances the scalability of the system and reduces the complexity of its security management and configuration. A system testbed is simulated using the Mininet emulator and the Amazon EC2 Cloud.

Original languageEnglish
Title of host publication2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM 2019): Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781728136875
ISBN (Print)9781728136882
DOIs
Publication statusPublished - Nov 2019
Externally publishedYes
Event2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019 - Manama, Bahrain
Duration: 19 Nov 201921 Nov 2019

Publication series

NameIEEE Middle East and North Africa COMMunications Conference (MENACOMM ):Proceedings
PublisherIEEE

Conference

Conference2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019
Country/TerritoryBahrain
CityManama
Period19/11/201921/11/2019

Keywords

  • Cloud Computing
  • Fog Computing
  • Mobile Edge Computing
  • Software Defined Networking
  • Wireless Network Virtualization
  • Wireless Security

ASJC Scopus subject areas

  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Signal Processing
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Mitigating rogue node attacks in edge computing'. Together they form a unique fingerprint.

Cite this