Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Securing Hybrid Architecture of Cloudlet Computing in 5G Networks Enabling IoT and Mobile Wireless Devices

Author(s): Tarek S. Sobh and Awad H. Khalil*

Volume 16, Issue 2, 2023

Published on: 03 September, 2022

Article ID: e130522204718 Pages: 16

DOI: 10.2174/2666255815666220513100257

Price: $65

Abstract

Aims: This research aims to secure and support mobile devices and IoTs enabled in WLAN and 5G Multi-Access Edge Computing (MEC) infrastructures.

Background: Currently, wireless network access gains increasing potential in today's networks. At the same time, such ongoing wireless network access also raises the risk of network attacks. The 5G technology is expected to empower people's inter-communications by integrating wireless networking technologies in all networks. Additionally, the emerging 5G technologies put forward many new requirements for RF characteristics and techniques regarding bandwidth and power issues, in addition to supporting high connectivity capacity for the emerging IP-based IoT applications.

Objective: The objective is to provide a hybrid architecture of the proposed framework for a 5G network with cloudlet computing. The purpose that we are focusing on it is to support and monitor wireless networks under attack.

Methods: The solution is done through a hybrid architecture. This architecture integrates the cloudlet and Wi-Fi Access Points (AP) to provide an integrated Wi-Fi-enabled cloudlet. On the other hand, we have specified a solution for detecting unauthorized APs by using authentication and authorization techniques for securing communications among endpoint devices such as IoT devices or mobile devices, cloudlet, and the main cloud. A framework of this architecture has been developed to face the issue of securing IoT devices and mobile wireless devices.

Results: The traffic sniffing and traffic filtering of the endpoints are done. Therefore, the required actions that define the organization's policy are applied through the permitted access list. In addition to a wireless network location, the management components use more than one authorized attribute value to generate the authorized list, such as SSID, MAC, BSSID …etc. Finally, Traffic analysis provides the user to get reports, statistics, and analysis charts to secure endpoints activities.

Conclusion: We are focusing on one of the critical security issues of wireless networks. Namely, the issue of unauthorized access becomes more critical due to getting access to a network without subscriber permission. Moreover, the proposed solution allows managing access control permissions to allow or block access to resources for the user of a mobile device.

Keywords: IoT, 5G, Cloudlet, Wireless Mobile Networks, Network Security, Cybersecurity

Graphical Abstract

[1]
A. Adeel, M. Ali, A.N. Khan, T. Khalid, F. Rehman, Y. Jararweh, and J. Shuja, "A multi‐attack resilient lightweight IoT authentication scheme", Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3676, 2019.
[http://dx.doi.org/10.1002/ett.3676]
[2]
A. Khurshid, A.N. Khan, F.G. Khan, M. Ali, J. Shuja, and A.R. Khan, "Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs", Concurr. Comput., vol. 31, no. 8, pp. 1-22, 2018.
[http://dx.doi.org/10.1002/cpe.4729]
[3]
S.B. Abhijit, and A.S. Umesh, "Attacks on wireless network and basic tips for securing Wi-Fi zone", IJIRMPS, vol. 4, no. 3, p. 117, 2018.
[4]
B. Al-Shargabi, S. Al-Jawarneh, and S. Hayajneh, "A cloudlet based security and trust model for E-government web services", J. Theor. Appl. Inf. Technol., vol. 98, no. 01, pp. 27-37, 2020.
[5]
B. Zhu, X. Hou, S. Liu, W. Ma, and M. Dong, "IoT equipment monitoring system based on C5.0 decision tree and time-series analysis", IEEE Access, vol. 10, pp. 36637-36648, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3054044]
[6]
C. Bloom, J. Tan, J. Ramjohn, and L. Bauer, "Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles", In Proc. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), Santa Clara, CA, USA, 2017, pp. 357-375
[7]
C-J. Wu, Y. Tie, S. Hara, K. Tamiya, A. Fujita, K. Yoshioka, and T. Matsumoto, "Iotprotect: Highly deployable whitelist-based protection for low-cost internet-of-things devices", J. Inf. Process., vol. 26, pp. 662-672, 2018.
[http://dx.doi.org/10.2197/ipsjjip.26.662]
[8]
C. Maple, "Security and privacy in the internet of things", J. Cyber Policy, vol. 2, no. 2, pp. 155-184, 2017.
[http://dx.doi.org/10.1080/23738871.2017.1366536]
[9]
D. Fang, Y. Qian, and R.Q. Hu, "Security for 5G mobile wireless networks", IEEE Access, vol. 6, pp. 4850-4874, 2018.
[http://dx.doi.org/10.1109/ACCESS.2017.2779146]
[10]
D. Fauri, M. Kapsalakis, D.R. dos Santos, E. Costante, J. den Hartog, and S. Etalle, "Role inference+ anomaly detection= situational awareness in BACnet networks", In: R. Perdisci, C. Maurice, G. Giacinto, M. Almgren, Eds., and Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2019.Lecture Notes in Computer Science, vol. , vol. 11543. Springer: Cham, 2019, pp. 461-481.
[http://dx.doi.org/10.1007/978-3-030-22038-9_22]
[11]
ESA. Satellite Frequency Bands, Available from: https://www.esa.int/Applications/Telecommunications_Integrated_ Applications/Satellite_frequency_bands[Accessed on 21 Apr,2020]
[12]
H. Rahimi, Y. Picaud, S. Costanzo, G. Madhusudan, O. Boissier, and K. Singh, "Design and simulation of a hybrid architecture for edge computing in 5G and beyond", IEEE Transac. Comput., vol. 70, no. 8, pp. 1213-1224, 2021.
[13]
H. Mao, N. Xiao, W. Shi, and Y. Lu, "Wukong: A cloud-oriented file service for mobile Internet devices", J. Parallel Distrib. Comput,, vol. 72, no. 2012., pp. 171-184, 2012.
[http://dx.doi.org/10.1016/j.jpdc.2011.10.017]
[14]
J. Liu, Y. Lai, and S. Zhang, "FL-GUARD: A detection and defense system for DDoS attack in SDN", In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy Wuhan, China, March 15-18, 2017 2017, pp. 107-111
[http://dx.doi.org/10.1145/3058060.3058074]
[15]
J.A. Alzubi, R. Manikandan, O.A. Alzubi, I. Qiqieh, R. Rahim, D. Gupta, and A. Khanna, "Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud", Measurement, vol. 150, p. 107077, 2020.
[http://dx.doi.org/10.1016/j.measurement.2019.107077]
[16]
J. Park, S. Samarakoon, M. Bennis, and M. Debbah, "Wireless network intelligence at the edge", Proc. IEEE, vol. 107, no. 11, pp. 2204-2239, 2019.
[http://dx.doi.org/10.1109/JPROC.2019.2941458]
[17]
J. Shuja, M.A. Humayun, W. Alasmary, H. Sinky, E. Alanazi, and M.K. Khan, "Resource efficient geo-textual “hierarchical clustering framework for social IoT applications”", IEEE Sens. J., vol. 21, no. 22, pp. 25114-25122, 2021.
[http://dx.doi.org/10.1109/JSEN.2021.3060953]
[18]
K.N. Gopinath, and C. Hemant, ""A quick reference to Rogue AP security threat, Rogue AP detection and mitigationAirTight Networks",", Available from: www.AirTightNetworks.com[Accessed on 21 Apr, 2020]
[19]
Liran Ma, and Y. Amin, "A hybrid rogue access point protection framework for commodity Wi-Fi networks", In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Apr 13-18, 2008, Phoenix, AZ, USA, 2008, pp. 1220-1228
[20]
M.F. Aziz, A.N. Khan, J. Shuja, I.A. Khan, F.G. Khan, and A.R. Khan, A lightweight and compromise‐resilient authentication scheme for IoTs., vol. 25. Trans. Emerg. Telecommun. Technol, 2019.
[http://dx.doi.org/10.1002/ett.3813]
[21]
M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, "Deep learning for IoT big data and streaming analytics: A survey", IEEE Commun. Surveys Tutor., vol. 20, no. 4, pp. 2923-2960, 2018.
[http://dx.doi.org/10.1109/COMST.2018.2844341]
[22]
M. Satyanarayanan, G. Lewis, E. Morris, S. Simanta, J. Boleng, and K. Ha, "The role of cloudlets in hostile environments", IEEE Pervasive Comput., vol. 12, no. 4, pp. 40-49, 2013.
[http://dx.doi.org/10.1109/MPRV.2013.77]
[23]
M. Satyanarayanan, R. Schuster, M. Ebling, G. Fettweis, H. Flinck, K. Joshi, and K. Sabnani, "An open ecosystem for mobile-cloud convergence", IEEE Commun. Mag., vol. 53, no. 3, pp. 63-70, 2015.
[http://dx.doi.org/10.1109/MCOM.2015.7060484]
[24]
M. Song, Z. Wang, Z. Zhang, Y. Song, Q. Wang, J. Ren, and H. Qi, "Analyzing user-level privacy attack against federated learning", IEEE J. Sel. Areas Comm., vol. 38, no. 10, pp. 2430-2444, 2020.
[http://dx.doi.org/10.1109/JSAC.2020.3000372]
[25]
N. Koutroumpouchos, C. Ntantogian, and C. Xenakis, "Building trust for smart connected devices: The challenges and pitfalls of trustZone", Sensors, vol. 21, no. 2, p. 45, 2021.
[http://dx.doi.org/10.3390/s21020520] [PMID: 33450919]
[26]
O.B. Sezer, E. Dogdu, and A.M. Ozbayoglu, "Context-aware computing, learning, and big data in internet of things: A survey", IEEE Internet Things J., vol. 5, no. 1, pp. 1-27, 2018.
[http://dx.doi.org/10.1109/JIOT.2017.2773600]
[27]
O. Vermesan, and P. Friess, Internet of Things-from Research and Innovation to Market Deployment, River Publishers: Aalborg, 2014.
[28]
Q. Qiu, S. Liu, S. Xu, and S. Yu, "Study on security and privacy in 5G-Enabled Applications", Wirel. Commun. Mob. Comput., pp. 1-15, 2020.
[http://dx.doi.org/10.1155/2020/8856683]
[29]
R. Yang, F.R. Yu, P. Si, Z. Yang, and Y. Zhang, "Integrated blockchain and edge computing systems: A survey, some research issues and challenges", IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1508-1532, 2019.
[http://dx.doi.org/10.1109/COMST.2019.2894727]
[30]
S.A. Bhat, I.B. Sofi, and A.C. Chi, "Edge computing and its convergence with blockchain in 5g and beyond: Security, challenges, and opportunities", IEEE Access, vol. 8, pp. 205340-205373, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3037108]
[31]
S. Zanero, "Wireless malware propagation: A reality check", IEEE Secur. Priv., vol. 7, no. 5, pp. 70-74, 2009.
[http://dx.doi.org/10.1109/MSP.2009.142]
[32]
T. Heer, O. Garcia-Morchon, R. Hummen, S.L. Keoh, S.S. Kumar, and K. Wehrle, "Security challenges in the IP-based internet of things", Wirel. Pers. Commun., vol. 61, no. 3, pp. 527-542, 2011.
[http://dx.doi.org/10.1007/s11277-011-0385-5]
[33]
T. Kohno, and A. Broido, "“Remote physical device fingerprinting”, In 2005", Proceedings of IEEE Symposium on Security and Privacy, vol. 2, no. 2, pp. 211-225, 2005.
[34]
T.S. Sobh, "Identity management using SAML for mobile clients and internet of things", J. High Speed Netw., vol. 25, no. 1, pp. 101-126, 2019.
[http://dx.doi.org/10.3233/JHS-190606]
[35]
T.S. Sobh, "Separating monitoring from control in SDN to mitigate DDoS attacks in hybrid clouds", Int. J. Sensors Wirel. Commun. Control, vol. 10, no. 3, pp. 382-394, 2020.
[http://dx.doi.org/10.2174/2210327909666190515111119]
[36]
S. Tarek, "Wi-Fi networks security and accessing control", Int. J. Comput. Netw., vol. 5, no. 7, pp. 9-30, 2013.
[37]
V.Q. Rodriguez, F. Guillemin, and A. Boubendir, "Automating the deployment of 5G network slices using ONAP", In 2019 10th International Conference on Networks of the Future (NoF), 1-3 Oct, 2019,, Rome, Italy, 2019, pp. 32-39.
[http://dx.doi.org/10.1109/NoF47743.2019.9015043]
[38]
W. Ejaz, "Internet of Things (IoT) in 5G wireless communications", IEEE Access, vol. 4, pp. 10310-10314, 2016.
[39]
Y.C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, "Mobile edge computing-A key technology towards 5G", ETSI White Paper, vol. 11, no. 11, pp. 1-6, 2015.
[40]
Y. Jiang, C.C. Liu, M. Diedesch, E. Lee, and A.K. Srivastava, "Outage management of distribution systems incorporating information from smart meters", IEEE Trans. Power Syst., vol. 31, no. 5, pp. 4144-4154, 2015.
[http://dx.doi.org/10.1109/TPWRS.2015.2503341]
[41]
Y. Shi, S. Abhilash, and K. Hwang, "Cloudlet mesh for securing mobile clouds from intrusions and network attacks", In The Third IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 30 Mar- 3 Apr, 2015,, San Francisco, CA, 2015, pp. 109-118.
[http://dx.doi.org/10.1109/MobileCloud.2015.15]
[42]
Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, "Heterogeneity in mobile cloud computing: Taxonomy and open challenges", IEEE Comm. Surv. Tutor., vol. 16, no. 1, pp. 369-392, 2014.
[http://dx.doi.org/10.1109/SURV.2013.050113.00090]
[43]
Z. Wang, J. Hu, Q. Wang, R. Lv, J. Wei, H. Chen, and X. Niu, "Taskbundling-based incentive for location-dependent mobile crowdsourcing", IEEE Commun. Mag., vol. 57, no. 2, pp. 54-59, 2019.
[http://dx.doi.org/10.1109/MCOM.2018.1700965]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy