Transpacific Testbed for Real-Time Experimentation

被引:1
作者
Ajayi, Oluwaseyi [1 ]
Huseynov, Huseyn [1 ]
Saadawi, Tarek [1 ]
Tsuru, Masato [2 ]
Kourai, Kenichi [3 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10031 USA
[2] Kyushu Inst Technol, Dept Comp Sci & Elect, Fukuoka, Japan
[3] Kyushu Inst Technol, Dept Creat Informat, Fukuoka, Japan
来源
2021 IEEE 4TH 5G WORLD FORUM (5GWF 2021) | 2021年
基金
美国国家科学基金会;
关键词
Blockchain; Cybersecurity; introspection; virtual machine; Intrusion detection System; IoT; Internet; GRE tunnel;
D O I
10.1109/5GWF52925.2021.00095
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The transpacific testbed is a generic routing encapsulation (GRE) tunnel built between CUNY City College (CCNY), USA and Kyushu Institute of Technology (KYUTECH), Japan. The tunnel, built through internet2, originated from CCNY through the JGN network in Seattle and terminated at Kyutech in Japan. The testbed defines the future of the Internet by focusing on addressing research challenges associated with enabling trustworthy networks, supporting the Internet of Things (IoT), which encompasses everything connected to the Internet and cyher-physical systems (CPS) - a controlled mechanism monitored by computer-based algorithms. In this paper, we describe the setting up and testing of the testbed. Furthermore, we describe the real-time experiments conducted on the testbed and present the results. The experiments are classified into two: blockchain-based cooperative intrusion detection system (CoIDS) and Secure Virtual Machine introspection. In each of the experiments, we describe the method and present the results. Finally, we look into the ongoing works of extending the testbed to the COSM-IC global testbed.
引用
收藏
页码:505 / 510
页数:6
相关论文
共 12 条
[1]  
Ajayi O., 2021, 2021 INT S NETW COMP
[2]   Secure Architecture for Inter-Healthcare Electronic Health Records Exchange [J].
Ajayi, Oluwaseyi ;
Abouali, Meryem ;
Saadawi, Tarek .
2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, :531-536
[3]  
Ajayi O, 2020, 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), P100, DOI [10.1109/cscloud-edgecom49738.2020.00025, 10.1109/CSCloud-EdgeCom49738.2020.00025]
[4]   Secured Cyber-Attack Signatures Distribution using Blockchain Technology [J].
Ajayi, Oluwaseyi ;
Cherian, Melvin ;
Saadawi, Tarek .
2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, :482-488
[5]  
Huseynov H., 2020 IEEE 21 INT C H
[6]  
Kourai K, 2016, IEEE INT CONF CLOUD, P43, DOI [10.1109/CLOUD.2016.14, 10.1109/CLOUD.2016.0016]
[7]   Efficient VM Introspection in KVM and Performance Comparison with Xen [J].
Kourai, Kenichi ;
Nakamura, Kousuke .
2014 20TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2014), 2014, :192-202
[8]  
Lantz B., 2010, PROC 9 ACM SIGCOMM W, P1
[9]  
Sanatinia A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST)
[10]   Explainable Security in SDN-Based IoT Networks [J].
Sarica, Alper Kaan ;
Angin, Pelin .
SENSORS, 2020, 20 (24) :1-30