3,039 research outputs found
A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
With the advent of the Internet-of-Things (IoT), vehicular networks and
cyber-physical systems, the need for real-time data processing and analysis has
emerged as an essential pre-requite for customers' satisfaction. In this
direction, Mobile Edge Computing (MEC) provides seamless services with reduced
latency, enhanced mobility, and improved location awareness. Since MEC has
evolved from Cloud Computing, it inherited numerous security and privacy issues
from the latter. Further, decentralized architectures and diversified
deployment environments used in MEC platforms also aggravate the problem;
causing great concerns for the research fraternity. Thus, in this paper, we
propose an efficient and lightweight mutual authentication protocol for MEC
environments; based on Elliptic Curve Cryptography (ECC), one-way hash
functions and concatenation operations. The designed protocol also leverages
the advantages of discrete logarithm problems, computational Diffie-Hellman,
random numbers and time-stamps to resist various attacks namely-impersonation
attacks, replay attacks, man-in-the-middle attacks, etc. The paper also
presents a comparative assessment of the proposed scheme relative to the
current state-of-the-art schemes. The obtained results demonstrate that the
proposed scheme incurs relatively less communication and computational
overheads, and is appropriate to be adopted in resource constraint MEC
environments.Comment: To appear in IEEE GLOBECOM 201
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
A Survey on Off-chain Networks: Frameworks, Technologies, Solutions and Challenges
Blockchain has received increasing attention in academia and industry.
However, the increasing transaction volumes and limited on-chain storage
underscore scalability as a key challenge hindering the widespread adoption of
blockchain. Fortunately, off-chain networks that enable transactions outside
the blockchain show promising potential to mitigate the scalability challenge.
Off-chain solutions that address blockchain scalability hurdles, such as
payment channel networks, facilitate secure and fast off-chain transactions,
thus relieving the main chain's strain. In this article, we provide a
comprehensive review of key technologies, solutions, and challenges of
off-chain networks. First, we introduce the background of off-chain networks
encompassing design motivation, framework, overview, and application scenarios.
We then review the key issues and technologies associated with off-chain
networks. Subsequently, we summarize the mainstream solutions for the
corresponding key issues. Finally, we discuss some research challenges and open
issues in this area.Comment: 30 pages, 5 figure
A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions
The Internet of Things (IoT) can enable seamless communication between millions of billions of objects. As IoT applications continue to grow, they face several challenges, including high latency, limited processing and storage capacity, and network failures. To address these stated challenges, the fog computing paradigm has been introduced, purpose is to integrate the cloud computing paradigm with IoT to bring the cloud resources closer to the IoT devices. Thus, it extends the computing, storage, and networking facilities toward the edge of the network. However, data processing and storage occur at the IoT devices themselves in the fog-based IoT network, eliminating the need to transmit the data to the cloud. Further, it also provides a faster response as compared to the cloud. Unfortunately, the characteristics of fog-based IoT networks arise traditional real-time security challenges, which may increase severe concern to the end-users. However, this paper aims to focus on fog-based IoT communication, targeting real-time security challenges. In this paper, we examine the layered architecture of fog-based IoT networks along working of IoT applications operating within the context of the fog computing paradigm. Moreover, we highlight real-time security challenges and explore several existing solutions proposed to tackle these challenges. In the end, we investigate the research challenges that need to be addressed and explore potential future research directions that should be followed by the research community.©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/fi=vertaisarvioitu|en=peerReviewed
- …