214 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author김호근-
dc.date.accessioned2021-10-20T05:00:48Z-
dc.date.available2021-10-20T05:00:48Z-
dc.date.issued2020-03-
dc.identifier.citationACM Transactions on Internet of Things, v. 1, no. 1, article no. 4en_US
dc.identifier.issn2577-6207-
dc.identifier.urihttps://dl.acm.org/doi/10.1145/3375837-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/165630-
dc.description.abstractAn emerging type of network architecture called edge computing has the potential to improve the availability and resilience of IoT services under anomalous situations such as network failures or denial-of-service (DoS) attacks. However, relatively little has been explored on the problem of ensuring availability even when edge computers that provide key security services (e.g., authentication and authorization) become unavailable themselves. This article proposes a resilient authentication and authorization framework to enhance the availability of IoT services under DoS attacks or failures. The proposed approach leverages a technique called secure migration, which allows an IoT device to migrate to another trusted edge computer when its own local authorization service becomes unavailable. Specifically, we describe the design of a secure migration framework and its supporting mechanisms, including (1) automated migration policy construction and (2) protocols for preparing and executing the secure migration. We formalize secure migration policy construction as an integer linear programming (ILP) problem and show its effectiveness using a case study on smart buildings, where the proposed solution achieves significantly higher availability under simulated attacks on authorization services.en_US
dc.description.sponsorshipThe work in this article was supported in part by the National Science Foundation (NSF), award #1446619 (Mathematical Theory of CPS), and the iCyPhy Research Center (Industrial Cyber-Physical Systems), supported by Avast, Denso, Ford, and Siemens. This work is also financially supported by the Swedish Foundation for Strategic Research (project FFL15-0032).en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.subjectInternet of thingsen_US
dc.subjectedge computingen_US
dc.subjectsecure migrationen_US
dc.subjectresiliencyen_US
dc.titleResilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computingen_US
dc.typeArticleen_US
dc.identifier.doi10.1145/3375837-
dc.relation.journalACM Transactions on Internet of Things-
dc.contributor.googleauthorKim, Hokeun-
dc.contributor.googleauthorKang, Eunsuk-
dc.contributor.googleauthorBroman, David-
dc.contributor.googleauthorLee, Edward A.-
dc.relation.code2020058500-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentSCHOOL OF ELECTRONIC ENGINEERING-
dc.identifier.pidhokeun-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > ELECTRONIC ENGINEERING(융합전자공학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE