Offloading Personal Security Applications to the network edge: a Mobile User case scenario

被引:0
作者
Montero, D. [1 ,2 ]
Serral-Gracia, R. [1 ]
机构
[1] Tech Univ Catalonia UPC, Networking & Informat Technol Lab NetIT Lab, Barcelona, Spain
[2] Dept Elect Elect & Telecommun Engn, Cuenca, Ecuador
来源
2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2016年
关键词
Security; virtualization; offloading; fog computing; mobility; NFV; SDN;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications "close" to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 25 条
  • [21] Parallel Offloading and Resource Optimization for Multi-Hop Ad Hoc Network-Enabled CBTC With Mobile Edge Computing
    Fang, Yujie
    Li, Meng
    Yu, F. Richard
    Si, Pengbo
    Yang, Ruizhe
    Gao, Chunhai
    Sun, Yanhua
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (02) : 2684 - 2698
  • [22] Edge Computing Resource Allocation for Unmanned Aerial Vehicle Assisted Mobile Network With Blockchain Applications
    Xu, Haitao
    Huang, Wentao
    Zhou, Yunhui
    Yang, Dongmei
    Li, Ming
    Han, Zhu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (05) : 3107 - 3121
  • [23] Security and Fairness in IoT Based e-Health System: A Case Study of Mobile Edge-Clouds
    Nwebonyi, Francis N.
    Martins, Rolando
    Correia, Manuel E.
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [24] Joint DNN Partitioning and Resource Allocation for Multiple Machine Learning-based Mobile Applications at the Network Edge
    Cheng, Cheng-Yu
    Gazda, Robert
    Liu, Hang
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 3937 - 3942
  • [25] Network Security Vulnerabilities and Personal Privacy Issues in Healthcare Information Systems: A case study in a private hospital in Turkey
    Namoglu, Nihan
    Ulgen, Yekta
    INFORMATICS, MANAGEMENT AND TECHNOLOGY IN HEALTHCARE, 2013, 190 : 126 - 128