The continuous growth in the number and capabilities of connected Internet of Things (IoT) and consumer devices, coupled with the increasing diversification of services running over the Internet, calls for the adoption of cutting-edge technologies to exchange, store, and process the big amount of generated data. Mobile Edge Computing (MEC) and Information-centric Networking (ICN) are candidate enabling technologies to cope with the raised issues in terms of scalability, low-latency, availability, reliability, and security. This paper proposes a protocol for secure and privacy-friendly service provisioning at the mobile edge, which also provides a fast way to build trust between consumers (mobile/IoT devices) and providers (middle tier servers and other mobile devices). The solution builds upon ICN pillars, in particular upon the Named Data Networking (NDN) paradigm. The security properties of the designed protocol are discussed and its behavior practically shown in a reference use case.

Securing the mobile edge through named data networking

Rottondi, Cristina;Verticale, Giacomo
2018-01-01

Abstract

The continuous growth in the number and capabilities of connected Internet of Things (IoT) and consumer devices, coupled with the increasing diversification of services running over the Internet, calls for the adoption of cutting-edge technologies to exchange, store, and process the big amount of generated data. Mobile Edge Computing (MEC) and Information-centric Networking (ICN) are candidate enabling technologies to cope with the raised issues in terms of scalability, low-latency, availability, reliability, and security. This paper proposes a protocol for secure and privacy-friendly service provisioning at the mobile edge, which also provides a fast way to build trust between consumers (mobile/IoT devices) and providers (middle tier servers and other mobile devices). The solution builds upon ICN pillars, in particular upon the Named Data Networking (NDN) paradigm. The security properties of the designed protocol are discussed and its behavior practically shown in a reference use case.
2018
Internet of Things (WF-IoT), 2018 IEEE 4th World Forum on
978-1-4673-9944-9
File in questo prodotto:
File Dimensione Formato  
securing-mobile-edge.pdf

accesso aperto

Descrizione: manuscript
: Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione 323.31 kB
Formato Adobe PDF
323.31 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/1054006
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 17
  • ???jsp.display-item.citation.isi??? 16
social impact