

You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Offloading personal security applications to the Network Edge: A mobile user case scenario
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications “close” to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research. Peer Reviewed
- Universitat Polite`cnica de Catalunya Spain
- University of Cuenca Ecuador
- University of Cuenca Ecuador
- Universitat Politècnica de Catalunya Spain
Vertical mobility, Interrelated mobility, :Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC], Network function virtualization, Seamless on-path security protection, Wireless LAN, Fog Computing, Virtualisation, Sdn, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors, Nfv, Software defined networking, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils, Network connections, Virtualization, Mobile user case scenario, Comunicacions mòbils, Sistemes de, Mobility management (mobile radio), Mobility, Mobile computing, Offloading, User mobility, Security threats, Seamless mobility, Dynamic orchestration, Wireless LANs, Xarxes locals sense fil Wi-Fi, Trusted computing, Dynamic management, Offloading personal security applications, Network edge, Seamless security migration, Security, :Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils [Àrees temàtiques de la UPC], Mobile communication systems, Computer network security, User-centric protection model, Trusted network node, Security application allocation, WiFi mobile user, Security application migration
Vertical mobility, Interrelated mobility, :Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC], Network function virtualization, Seamless on-path security protection, Wireless LAN, Fog Computing, Virtualisation, Sdn, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors, Nfv, Software defined networking, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils, Network connections, Virtualization, Mobile user case scenario, Comunicacions mòbils, Sistemes de, Mobility management (mobile radio), Mobility, Mobile computing, Offloading, User mobility, Security threats, Seamless mobility, Dynamic orchestration, Wireless LANs, Xarxes locals sense fil Wi-Fi, Trusted computing, Dynamic management, Offloading personal security applications, Network edge, Seamless security migration, Security, :Enginyeria de la telecomunicació::Radiocomunicació i exploració electromagnètica::Comunicacions mòbils [Àrees temàtiques de la UPC], Mobile communication systems, Computer network security, User-centric protection model, Trusted network node, Security application allocation, WiFi mobile user, Security application migration
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).10 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 10% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Average impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Average visibility views 41 - 41views
Data source Views Downloads UPCommons. Portal del coneixement obert de la UPC 41 0

