Abstract
Aims: This research aims to secure and support mobile devices and IoTs enabled in WLAN and 5G Multi-Access Edge Computing (MEC) infrastructures.
Background: Currently, wireless network access gains increasing potential in today's networks. At the same time, such ongoing wireless network access also raises the risk of network attacks. The 5G technology is expected to empower people's inter-communications by integrating wireless networking technologies in all networks. Additionally, the emerging 5G technologies put forward many new requirements for RF characteristics and techniques regarding bandwidth and power issues, in addition to supporting high connectivity capacity for the emerging IP-based IoT applications.
Objective: The objective is to provide a hybrid architecture of the proposed framework for a 5G network with cloudlet computing. The purpose that we are focusing on it is to support and monitor wireless networks under attack.
Methods: The solution is done through a hybrid architecture. This architecture integrates the cloudlet and Wi-Fi Access Points (AP) to provide an integrated Wi-Fi-enabled cloudlet. On the other hand, we have specified a solution for detecting unauthorized APs by using authentication and authorization techniques for securing communications among endpoint devices such as IoT devices or mobile devices, cloudlet, and the main cloud. A framework of this architecture has been developed to face the issue of securing IoT devices and mobile wireless devices.
Results: The traffic sniffing and traffic filtering of the endpoints are done. Therefore, the required actions that define the organization's policy are applied through the permitted access list. In addition to a wireless network location, the management components use more than one authorized attribute value to generate the authorized list, such as SSID, MAC, BSSID …etc. Finally, Traffic analysis provides the user to get reports, statistics, and analysis charts to secure endpoints activities.
Conclusion: We are focusing on one of the critical security issues of wireless networks. Namely, the issue of unauthorized access becomes more critical due to getting access to a network without subscriber permission. Moreover, the proposed solution allows managing access control permissions to allow or block access to resources for the user of a mobile device.
Keywords: IoT, 5G, Cloudlet, Wireless Mobile Networks, Network Security, Cybersecurity
Graphical Abstract
[http://dx.doi.org/10.1002/ett.3676]
[http://dx.doi.org/10.1002/cpe.4729]
[http://dx.doi.org/10.1109/ACCESS.2021.3054044]
[http://dx.doi.org/10.2197/ipsjjip.26.662]
[http://dx.doi.org/10.1080/23738871.2017.1366536]
[http://dx.doi.org/10.1109/ACCESS.2017.2779146]
[http://dx.doi.org/10.1007/978-3-030-22038-9_22]
[http://dx.doi.org/10.1016/j.jpdc.2011.10.017]
[http://dx.doi.org/10.1145/3058060.3058074]
[http://dx.doi.org/10.1016/j.measurement.2019.107077]
[http://dx.doi.org/10.1109/JPROC.2019.2941458]
[http://dx.doi.org/10.1109/JSEN.2021.3060953]
[http://dx.doi.org/10.1002/ett.3813]
[http://dx.doi.org/10.1109/COMST.2018.2844341]
[http://dx.doi.org/10.1109/MPRV.2013.77]
[http://dx.doi.org/10.1109/MCOM.2015.7060484]
[http://dx.doi.org/10.1109/JSAC.2020.3000372]
[http://dx.doi.org/10.3390/s21020520] [PMID: 33450919]
[http://dx.doi.org/10.1109/JIOT.2017.2773600]
[http://dx.doi.org/10.1155/2020/8856683]
[http://dx.doi.org/10.1109/COMST.2019.2894727]
[http://dx.doi.org/10.1109/ACCESS.2020.3037108]
[http://dx.doi.org/10.1109/MSP.2009.142]
[http://dx.doi.org/10.1007/s11277-011-0385-5]
[http://dx.doi.org/10.3233/JHS-190606]
[http://dx.doi.org/10.2174/2210327909666190515111119]
[http://dx.doi.org/10.1109/NoF47743.2019.9015043]
[http://dx.doi.org/10.1109/TPWRS.2015.2503341]
[http://dx.doi.org/10.1109/MobileCloud.2015.15]
[http://dx.doi.org/10.1109/SURV.2013.050113.00090]
[http://dx.doi.org/10.1109/MCOM.2018.1700965]