Friend or Foe? Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms Conference Paper uri icon

abstract

  • 2015 IEEE. The evolution of mobile devices into highly capable computing platforms that sense, store, and execute complex tasks is making them attractive candidates for edge computational micro-cloud settings. Such solutions are creating novel security challenges due to the increased push for more seamless computational cyber-foraging that leverages the exploding proliferation of mobile devices. A major concern is that security challenges stemming from these trends, are growing at a rate exceeding the evolution of security solutions. In this paper, we consider an environment in which computational offloading is performed among a set of mobile devices. We propose HoneyBot, a defense technique for device-to-device (d2d) malicious communication. While classical honeypots designed to isolate distributed denial of service (DDoS) botnet attacks fail to detect d2d insider attacks, HoneyBot nodes detect, track, and isolate such attacks. We propose and investigate detection and tracking algorithms that leverage insecure d2d infected communication channels to accurately and efficiently identify suspect malicious nodes and isolate them. Our data driven evaluation and analysis, based on 3 real world mobility traces, show that the number and placement of HoneyBot nodes (Hb) in the network considerably impact the tracking delay and the detection accuracy.

name of conference

  • 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)

published proceedings

  • 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM)

altmetric score

  • 3

author list (cited authors)

  • Mtibaa, A., Harras, K. A., & Alnuweiri, H.

citation count

  • 24

complete list of authors

  • Mtibaa, Abderrahmen||Harras, Khaled A||Alnuweiri, Hussein

publication date

  • November 2015