Offloading personal security applications to the Network Edge: A mobile user case scenario

  • D. Montero
  • , R. Serral-Gracia

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications 'close' to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research.

Original languageEnglish
Title of host publication2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages96-101
Number of pages6
ISBN (Electronic)9781509003044
DOIs
StatePublished - 26 Sep 2016
Event12th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2016 - Paphos, Cyprus
Duration: 5 Sep 20169 Sep 2016

Publication series

Name2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016

Conference

Conference12th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2016
Country/TerritoryCyprus
CityPaphos
Period5/09/169/09/16

Keywords

  • Fog computing
  • Mobility
  • NFV
  • Offloading
  • SDN
  • Security
  • Virtualization

Fingerprint

Dive into the research topics of 'Offloading personal security applications to the Network Edge: A mobile user case scenario'. Together they form a unique fingerprint.

Cite this