The continuous growth in the number and capabilities of connected Internet of Things (IoT) and consumer devices, coupled with the increasing diversification of services running over the Internet, calls for the adoption of cutting-edge technologies to exchange, store, and process the big amount of generated data. Mobile Edge Computing (MEC) and Information-centric Networking (ICN) are candidate enabling technologies to cope with the raised issues in terms of scalability, low-latency, availability, reliability, and security. This paper proposes a protocol for secure and privacy-friendly service provisioning at the mobile edge, which also provides a fast way to build trust between consumers (mobile/IoT devices) and providers (middle tier servers and other mobile devices). The solution builds upon ICN pillars, in particular upon the Named Data Networking (NDN) paradigm. The security properties of the designed protocol are discussed and its behavior practically shown in a reference use case.
Securing the mobile edge through named data networking / Amadeo, M.; Campolo, C.; Molinaro, A.; Rottondi, C.; Verticale, G.. - ELETTRONICO. - 2018-January:(2018), pp. 80-85. (Intervento presentato al convegno 4th IEEE World Forum on Internet of Things, WF-IoT 2018 tenutosi a Singapore nel 5 February 2018 through 8 February 2018) [10.1109/WF-IoT.2018.8355230].
Securing the mobile edge through named data networking
Rottondi, C.;
2018
Abstract
The continuous growth in the number and capabilities of connected Internet of Things (IoT) and consumer devices, coupled with the increasing diversification of services running over the Internet, calls for the adoption of cutting-edge technologies to exchange, store, and process the big amount of generated data. Mobile Edge Computing (MEC) and Information-centric Networking (ICN) are candidate enabling technologies to cope with the raised issues in terms of scalability, low-latency, availability, reliability, and security. This paper proposes a protocol for secure and privacy-friendly service provisioning at the mobile edge, which also provides a fast way to build trust between consumers (mobile/IoT devices) and providers (middle tier servers and other mobile devices). The solution builds upon ICN pillars, in particular upon the Named Data Networking (NDN) paradigm. The security properties of the designed protocol are discussed and its behavior practically shown in a reference use case.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2722702
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo