TY - JOUR
T1 - Hierarchical security paradigm for iot multiaccess edge computing
AU - Singh, Jaspreet
AU - Bello, Yahuza
AU - Hussein, Ahmed Refaey
AU - Erbad, Aiman
AU - Mohamed, Amr
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/4/1
Y1 - 2021/4/1
N2 - The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several challenges, such as security, latency, scalability, and quality of service, for which reason edge computing or fog computing has been introduced. The edge is capable of offloading resources to the edge to reduce workload at the cloud. Several security challenges come with multiaccess edge computing (MEC), such as location-based attacks, the man- in-the-middle attacks, and sniffing. This article proposes a software-defined perimeter (SDP) framework to supplement MEC and provide added security. The SDP is capable of protecting the cloud from the edge by only authorizing authenticated users at the edge to access services in the cloud. The SDP is implemented within a mobile-edge LTE network. Delay analysis of the implementation is performed, followed by a Denial-of-Service (DoS) attack to demonstrate the resilience of the proposed SDP. Further analyses, such as CPU usage and port scanning were performed to verify the efficiency of the proposed SDP. This analysis is followed by concluding remarks with insight into the future of the SDP in MEC.
AB - The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several challenges, such as security, latency, scalability, and quality of service, for which reason edge computing or fog computing has been introduced. The edge is capable of offloading resources to the edge to reduce workload at the cloud. Several security challenges come with multiaccess edge computing (MEC), such as location-based attacks, the man- in-the-middle attacks, and sniffing. This article proposes a software-defined perimeter (SDP) framework to supplement MEC and provide added security. The SDP is capable of protecting the cloud from the edge by only authorizing authenticated users at the edge to access services in the cloud. The SDP is implemented within a mobile-edge LTE network. Delay analysis of the implementation is performed, followed by a Denial-of-Service (DoS) attack to demonstrate the resilience of the proposed SDP. Further analyses, such as CPU usage and port scanning were performed to verify the efficiency of the proposed SDP. This analysis is followed by concluding remarks with insight into the future of the SDP in MEC.
KW - Denial of Service (DoS)
KW - IoT edge computing
KW - LTE
KW - fog computing
KW - multiaccess edge computing (MEC)
KW - security
KW - software-defined perimeter (SDP)
UR - http://www.scopus.com/inward/record.url?scp=85103339793&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3033265
DO - 10.1109/JIOT.2020.3033265
M3 - Article
AN - SCOPUS:85103339793
SN - 2327-4662
VL - 8
SP - 5794
EP - 5805
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 7
M1 - 9237982
ER -