Mostra el registre d'ítem simple
Offloading personal security applications to the Network Edge: a mobile user case scenario
dc.contributor.author | Montero Banegas, Diego Teodoro |
dc.contributor.author | Serral Gracià, René |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
dc.date.accessioned | 2016-10-31T16:46:35Z |
dc.date.issued | 2016 |
dc.identifier.citation | Montero, D., Serral, R. Offloading personal security applications to the Network Edge: a mobile user case scenario. A: International Wireless Communications and Mobile Computing Conference. "2016 International Wireless Communications and Mobile Computing Conference (IWCMC 2016): Paphos, Cyprus: 5-9 September 2016". Paphos: Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 96-101. |
dc.identifier.isbn | 978-1-5090-0305-1 |
dc.identifier.uri | http://hdl.handle.net/2117/91296 |
dc.description.abstract | This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications “close” to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research. |
dc.format.extent | 6 p. |
dc.language.iso | eng |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils |
dc.subject.lcsh | Wireless LANs |
dc.subject.lcsh | Mobile communication systems |
dc.subject.other | Computer network security |
dc.subject.other | Mobile computing |
dc.subject.other | Mobility management (mobile radio) |
dc.subject.other | Software defined networking |
dc.subject.other | Trusted computing |
dc.subject.other | Virtualisation |
dc.subject.other | Wireless LAN |
dc.subject.other | Offloading personal security applications |
dc.subject.other | Network edge |
dc.subject.other | Mobile user case scenario |
dc.subject.other | User mobility |
dc.subject.other | User-centric protection model |
dc.subject.other | Security threats |
dc.subject.other | Trusted network node |
dc.subject.other | Interrelated mobility |
dc.subject.other | Security application allocation |
dc.subject.other | Seamless mobility |
dc.subject.other | Network connections |
dc.subject.other | Dynamic orchestration |
dc.subject.other | Dynamic management |
dc.subject.other | Security application migration |
dc.subject.other | Software defined networking |
dc.subject.other | Network function virtualization |
dc.subject.other | Seamless on-path security protection |
dc.subject.other | WiFi mobile user |
dc.subject.other | Seamless security migration |
dc.subject.other | Vertical mobility |
dc.title | Offloading personal security applications to the Network Edge: a mobile user case scenario |
dc.type | Conference report |
dc.subject.lemac | Xarxes locals sense fil Wi-Fi |
dc.subject.lemac | Comunicacions mòbils, Sistemes de |
dc.identifier.doi | 10.1109/IWCMC.2016.7577040 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ieeexplore.ieee.org/document/7577040/ |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 19160863 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Montero, D.; Serral, R. |
local.citation.contributor | International Wireless Communications and Mobile Computing Conference |
local.citation.pubplace | Paphos |
local.citation.publicationName | 2016 International Wireless Communications and Mobile Computing Conference (IWCMC 2016): Paphos, Cyprus: 5-9 September 2016 |
local.citation.startingPage | 96 |
local.citation.endingPage | 101 |