KLI

On the Suitability of Intrusion Detection System for Wireless Edge Networks

Metadata Downloads
Abstract
Multi-access edge computing has become a strategic concept of the Internet of Things. The edge computing market has reached USD several billion and is growing intensively. In the edge-computing paradigm, most of the data is processed close to, or at the edge of, the network. This greatly reduces the computation and communication load of the network core. Moreover, edge computing provides better support for user privacy. On the other hand, an increase in data processing locations will proportionately increase the attack surface. An edge node can be put out of service easily by being flooded with spoofed packets owing to limited capacities and resources. Furthermore, wireless edge nodes are quite vulnerable to energy exhaustion attacks. In this situation, traditional network security mechanisms cannot be used effectively. Therefore, a tradeoff between security and efficiency is needed. This study considered the requirements under which the use of an intrusion detection system (IDS) is justified. To the best of our knowledge, this is a first attempt to combine IDS quality, system performance degradation due to IDS operations, and workload specificity into a unified quantitative criterion. This paper is an extended version of a report published in the proceedings of the ICCSA 2020 and differs from it in many ways. In particular, this paper considers novel mathematical problems regarding the deployment strategies for an IDS and the corresponding inverse problems and provides closed-form solutions for a few previously unsolved problems.
Author(s)
구인수Olga SokolovaShakhovVladimir
Issued Date
2021
Type
Article
Keyword
edge computingenergy exhaustion attackflooding attackintrusion detection systemIoT deviceswireless communications
DOI
10.3390/en14185954
URI
https://oak.ulsan.ac.kr/handle/2021.oak/9084
https://ulsan-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay?docid=TN_cdi_doaj_primary_oai_doaj_org_article_3298d8ea2abd4a56b20107ae3e9fea58&context=PC&vid=ULSAN&lang=ko_KR&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,On%20the%20Suitability%20of%20Intrusion%20Detection%20System%20for%20Wireless%20Edge%20Networks&offset=0&pcAvailability=true
Publisher
ENERGIES
Location
스위스
Language
영어
ISSN
1996-1073
Citation Volume
14
Citation Number
18
Citation Start Page
5954
Citation End Page
5954
Appears in Collections:
Engineering > IT Convergence
공개 및 라이선스
  • 공개 구분공개
파일 목록
  • 관련 파일이 존재하지 않습니다.

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.