Offloading personal security applications to the Network Edge: A mobile user case scenario

dc.contributor.authorMontero, D
dc.date.accessioned2018-01-11T16:47:25Z
dc.date.available2018-01-11T16:47:25Z
dc.date.issued2016-09-05
dc.description.abstractThis paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications 'close' to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research.
dc.description.cityPaphos
dc.identifier.doi10.1109/IWCMC.2016.7577040
dc.identifier.isbn9781509003044
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84994158989&doi=10.1109%2fIWCMC.2016.7577040&partnerID=40&md5=6e5c0190d94817b84a36276db2140d59
dc.identifier.urihttp://dspace.ucuenca.edu.ec/handle/123456789/29104
dc.language.isoen_US
dc.publisherINSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC.
dc.source2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016
dc.subjectFog Computing
dc.subjectMobility
dc.subjectNfv
dc.subjectOffloading
dc.subjectSdn
dc.subjectSecurity
dc.subjectVirtualization
dc.titleOffloading personal security applications to the Network Edge: A mobile user case scenario
dc.typeArticle
dc.ucuenca.afiliacionmontero, d., networking and information technology lab (netit lab), technical university of catalonia (upc), spain, department of electrical, electronics and telecommunications engineering, university of cuenca, ecuador
dc.ucuenca.embargoend2022-01-01 0:00
dc.ucuenca.indicebibliograficoSCOPUS
dc.ucuenca.nombrerevista12th IEEE International Wireless Communications and Mobile Computing Conference IWCMC 2016

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
documento.pdf
Size:
168.92 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
19.94 KB
Format:
Plain Text
Description:

Collections