A Framework for Improving Network Resilience Using SDN and Fog Nodes

被引:0
作者
Modarresi, Amir [1 ]
Gangadhar, Siddharth [1 ]
Sterbenz, James P. G. [1 ,2 ,3 ,4 ]
机构
[1] Univ Kansas, Elect Engn & Comp Sci, Informat & Telecommun Technol Ctr, Lawrence, KS 66045 USA
[2] Univ Lancaster, SCC, Lancaster LA1 4WA, England
[3] Univ Lancaster, InfoLab21, Lancaster LA1 4WA, England
[4] Hong Kong Polytech Univ, Comp, Kowloon, Hong Kong, Peoples R China
来源
PROCEEDINGS OF 2017 9TH INTERNATIONAL WORKSHOP ON RESILIENT NETWORKS DESIGN AND MODELING (RNDM) | 2017年
关键词
Resilience; survivability; Future Internet; IoT; SDN; OpenFlow; Cloud and fog computing; OpenFog; Network security; IP spoofing; intrusion detection; Mininet network simulator;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The IoT (Internet of Things) is one of the primary reasons for the massive growth in the number of connected devices to the Internet, thus leading to an increased volume of traffic in the core network. Fog and edge computing are becoming a solution to handle IoT traffic by moving time-sensitive processing to the edge of the network, while using the conventional cloud for historical analysis and long-term storage. Providing processing, storage, and network communication at the edge network are the aim of fog computing to reduce delay, network traffic, and decentralise computing. In this paper, we define a framework that realises fog computing that can be extended to install any service of choice. Our framework utilises fog nodes as an extension of the traditional switch to include processing, networking, and storage. The fog nodes act as local decision-making elements that interface with software-defined networking (SDN), to be able to push updates throughout the network. To test our framework, we develop an IP spoofing security application and ensure its correctness through multiple experiments.
引用
收藏
页数:7
相关论文
共 24 条
  • [1] [Anonymous], 2010, THE POX CONTROLLER
  • [2] [Anonymous], 2017, OpenFog
  • [3] [Anonymous], 2010, INSTANT VIRTUAL NETW
  • [4] [Anonymous], 2009, INFOCOM Keynote Talk
  • [5] [Anonymous], 2014, P 6 INT C ADV FUT IN
  • [6] Belyaev M., 2014, SCI TECHN C MOD NETW, P1
  • [7] Biondi P., 2011, SCAPY PROJECT
  • [8] Casado M, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P137
  • [9] Cisco, 2014, The Internet of Things Reference Model
  • [10] Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    Giotis, K.
    Argyropoulos, C.
    Androulidakis, G.
    Kalogeras, D.
    Maglaris, V.
    [J]. COMPUTER NETWORKS, 2014, 62 : 122 - 136