{"title":"移动边缘计算中的能源-性能-安全权衡","authors":"Mahipal P. Singh, S. Sankaran","doi":"10.1109/IGSC55832.2022.9969375","DOIUrl":null,"url":null,"abstract":"Multi-access Edge Computing (MEC) also known as Mobile Edge Computing is a type of edge computing that extends the capabilities of cloud computing by bringing resources to the edge of the network. Traditional cloud computing occurs on remote servers far away from users and IoT devices, whereas MEC allows computing processes to take place at base stations, central offices or other aggregation points within the transport network. However, localization of MEC nodes near the data-generating devices gives rise to several challenges such as launch of several attacks from data-generating or network edge devices on the nodes. In this paper, we simulate Distributed Denial of Service (DDoS) and Routing-based attacks to determine their impact on energy and performance. In addition, we propose a novel approach for mitigating the DDoS attack in MEC nodes. Our approach accurately discriminates between high-rate and low-rate DDoS attacks and provides defence against both of them. Our method has a 90% success rate in successfully detecting and thwarting DDoS attack on MEC nodes.","PeriodicalId":114200,"journal":{"name":"2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Energy-Performance-Security Trade-off in Mobile Edge Computing\",\"authors\":\"Mahipal P. Singh, S. Sankaran\",\"doi\":\"10.1109/IGSC55832.2022.9969375\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multi-access Edge Computing (MEC) also known as Mobile Edge Computing is a type of edge computing that extends the capabilities of cloud computing by bringing resources to the edge of the network. Traditional cloud computing occurs on remote servers far away from users and IoT devices, whereas MEC allows computing processes to take place at base stations, central offices or other aggregation points within the transport network. However, localization of MEC nodes near the data-generating devices gives rise to several challenges such as launch of several attacks from data-generating or network edge devices on the nodes. In this paper, we simulate Distributed Denial of Service (DDoS) and Routing-based attacks to determine their impact on energy and performance. In addition, we propose a novel approach for mitigating the DDoS attack in MEC nodes. Our approach accurately discriminates between high-rate and low-rate DDoS attacks and provides defence against both of them. Our method has a 90% success rate in successfully detecting and thwarting DDoS attack on MEC nodes.\",\"PeriodicalId\":114200,\"journal\":{\"name\":\"2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IGSC55832.2022.9969375\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IGSC55832.2022.9969375","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Energy-Performance-Security Trade-off in Mobile Edge Computing
Multi-access Edge Computing (MEC) also known as Mobile Edge Computing is a type of edge computing that extends the capabilities of cloud computing by bringing resources to the edge of the network. Traditional cloud computing occurs on remote servers far away from users and IoT devices, whereas MEC allows computing processes to take place at base stations, central offices or other aggregation points within the transport network. However, localization of MEC nodes near the data-generating devices gives rise to several challenges such as launch of several attacks from data-generating or network edge devices on the nodes. In this paper, we simulate Distributed Denial of Service (DDoS) and Routing-based attacks to determine their impact on energy and performance. In addition, we propose a novel approach for mitigating the DDoS attack in MEC nodes. Our approach accurately discriminates between high-rate and low-rate DDoS attacks and provides defence against both of them. Our method has a 90% success rate in successfully detecting and thwarting DDoS attack on MEC nodes.