Security Vulnerabilities of Server-Centric Wireless Datacenters

被引:1
作者
Mamun, Sayed Ashraf [1 ]
Ganguly, Amlan [1 ]
Markopoulos, Panos P. [1 ]
Kwasinski, Andres [1 ]
Kwon, Minseok [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2020年
关键词
datacenter security; wireless datacenter; wireless security; eavesdropping; DoS attack; jamming attack;
D O I
10.1109/cns48642.2020.9162233
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless datacenter network is an emerging technology. Recent works have shown that by utilizing millimeter wave (mmWave) wireless communication, the power consumption of the networking equipment of datacenters can be reduced drastically. However, security of a datacenter is one of the highest design priorities. Many studies on the security of wired datacenters including identifying the possible threats and solutions have been explored in the literature. On the contrary, being an emerging technology, no study has been conducted on the security for the wireless datacenters. Moreover, being a wireless system, it also inherits most of the threats of a typical wireless system if not all. So, in order to successfully realize wireless datacenter architectures, it is essential to do an extensive investigation of the system from a security perspective. In this paper, we have done an extensive study on the possible threats and their impact on the wireless datacenter network. We showed that eavesdropping, denial of services, and jamming attacks are the most critical security threats for wireless datacenters.
引用
收藏
页数:9
相关论文
共 32 条
  • [1] [Anonymous], 2016, 1005775 LBNL
  • [2] [Anonymous], 2007, Secur. Distrib., Grid, mobile, Pervasive Comput.
  • [3] Wireless security is different
    Arbaugh, WA
    [J]. COMPUTER, 2003, 36 (08) : 99 - 101
  • [4] Baccour E, 2015, 2015 49TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS)
  • [5] Benson T., 2010, Proceedings of the 10th annual conference on Internet measurement - IMC '10, P267, DOI [DOI 10.1145/1879141.1879175, 10.1145/1879141.1879175]
  • [6] Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers
    Bilal, Kashif
    Khalid, Osman
    Erbad, Aiman
    Khan, Samee U.
    [J]. COMPUTER NETWORKS, 2018, 130 : 94 - 120
  • [7] Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing
    Chen, Zhen
    Dong, Wenyu
    Li, Hang
    Zhang, Peng
    Chen, Xinming
    Cao, Junwei
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (01) : 82 - 94
  • [8] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [9] Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges
    Curiac, Daniel-Ioan
    [J]. SENSORS, 2016, 16 (04)
  • [10] Eltayeb MohammedE., 2016, 2016 IEEE Global Communications Conference (GLOBECOM), P1