Friend or Foe? Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms
Conference Paper
Overview
Research
Identity
Additional Document Info
Other
View All
Overview
abstract
2015 IEEE. The evolution of mobile devices into highly capable computing platforms that sense, store, and execute complex tasks is making them attractive candidates for edge computational micro-cloud settings. Such solutions are creating novel security challenges due to the increased push for more seamless computational cyber-foraging that leverages the exploding proliferation of mobile devices. A major concern is that security challenges stemming from these trends, are growing at a rate exceeding the evolution of security solutions. In this paper, we consider an environment in which computational offloading is performed among a set of mobile devices. We propose HoneyBot, a defense technique for device-to-device (d2d) malicious communication. While classical honeypots designed to isolate distributed denial of service (DDoS) botnet attacks fail to detect d2d insider attacks, HoneyBot nodes detect, track, and isolate such attacks. We propose and investigate detection and tracking algorithms that leverage insecure d2d infected communication channels to accurately and efficiently identify suspect malicious nodes and isolate them. Our data driven evaluation and analysis, based on 3 real world mobility traces, show that the number and placement of HoneyBot nodes (Hb) in the network considerably impact the tracking delay and the detection accuracy.
name of conference
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)