Mostra el registre d'ítem simple

dc.contributor.authorMontero Banegas, Diego Teodoro
dc.contributor.authorSerral Gracià, René
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2016-10-31T16:46:35Z
dc.date.issued2016
dc.identifier.citationMontero, D., Serral, R. Offloading personal security applications to the Network Edge: a mobile user case scenario. A: International Wireless Communications and Mobile Computing Conference. "2016 International Wireless Communications and Mobile Computing Conference (IWCMC 2016): Paphos, Cyprus: 5-9 September 2016". Paphos: Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 96-101.
dc.identifier.isbn978-1-5090-0305-1
dc.identifier.urihttp://hdl.handle.net/2117/91296
dc.description.abstractThis paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications “close” to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research.
dc.format.extent6 p.
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils
dc.subject.lcshWireless LANs
dc.subject.lcshMobile communication systems
dc.subject.otherComputer network security
dc.subject.otherMobile computing
dc.subject.otherMobility management (mobile radio)
dc.subject.otherSoftware defined networking
dc.subject.otherTrusted computing
dc.subject.otherVirtualisation
dc.subject.otherWireless LAN
dc.subject.otherOffloading personal security applications
dc.subject.otherNetwork edge
dc.subject.otherMobile user case scenario
dc.subject.otherUser mobility
dc.subject.otherUser-centric protection model
dc.subject.otherSecurity threats
dc.subject.otherTrusted network node
dc.subject.otherInterrelated mobility
dc.subject.otherSecurity application allocation
dc.subject.otherSeamless mobility
dc.subject.otherNetwork connections
dc.subject.otherDynamic orchestration
dc.subject.otherDynamic management
dc.subject.otherSecurity application migration
dc.subject.otherSoftware defined networking
dc.subject.otherNetwork function virtualization
dc.subject.otherSeamless on-path security protection
dc.subject.otherWiFi mobile user
dc.subject.otherSeamless security migration
dc.subject.otherVertical mobility
dc.titleOffloading personal security applications to the Network Edge: a mobile user case scenario
dc.typeConference report
dc.subject.lemacXarxes locals sense fil Wi-Fi
dc.subject.lemacComunicacions mòbils, Sistemes de
dc.identifier.doi10.1109/IWCMC.2016.7577040
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://ieeexplore.ieee.org/document/7577040/
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac19160863
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorMontero, D.; Serral, R.
local.citation.contributorInternational Wireless Communications and Mobile Computing Conference
local.citation.pubplacePaphos
local.citation.publicationName2016 International Wireless Communications and Mobile Computing Conference (IWCMC 2016): Paphos, Cyprus: 5-9 September 2016
local.citation.startingPage96
local.citation.endingPage101


Fitxers d'aquest items

Imatge en miniatura

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple