Efficient auto-configuration of energy-related parameters in cloud-based IoT platforms

Author(s):  
Apostolos Papageorgiou ◽  
Manuel Zahn ◽  
Erno Kovacs
Keyword(s):  
Author(s):  
Gianmarco Cerutti ◽  
Rahul Prasad ◽  
Alessio Brutti ◽  
Elisabetta Farella

2021 ◽  
pp. 108040
Author(s):  
Leonardo Babun ◽  
Kyle Denney ◽  
Z. Berkay Celik ◽  
Patrick McDaniel ◽  
A. Selcuk Uluagac

2021 ◽  
Vol 13 (1) ◽  
pp. 12
Author(s):  
Juan Wang ◽  
Yang Yu ◽  
Yi Li ◽  
Chengyang Fan ◽  
Shirong Hao

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network policies and leaking sensitive processing states, due to running in a shared open environment and lacking the protection of proprietary hardware. Currently, Intel® Software Guard Extensions (SGX) provides a promising way to build a secure and trusted VNF (virtual network function) by isolating VNF or sensitive data into an enclave. However, directly placing multiple VNFs in a single enclave will lose the scalability advantage of NFV. This paper combines SGX and click technology to design the virtual security function architecture based on multiple enclaves. In our design, the sensitive modules of a VNF are put into different enclaves and communicate by local attestation. The system can freely combine these modules according to user requirements, and increase the scalability of the system while protecting its running state security. In addition, we design a new hot-swapping scheme to enable the system to dynamically modify the configuration function at runtime, so that the original VNFs do not need to stop when the function of VNFs is modified. We implement an IDS (intrusion detection system) based on our architecture to verify the feasibility of our system and evaluate its performance. The results show that the overhead introduced by the system architecture is within an acceptable range.


2016 ◽  
Vol 54 (7) ◽  
pp. 48-54 ◽  
Author(s):  
Jaeho Kim ◽  
Jaeseok Yun ◽  
Sung-Chan Choi ◽  
Dale N. Seed ◽  
Guang Lu ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 378
Author(s):  
Alberto Partida ◽  
Regino Criado ◽  
Miguel Romance

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.


Author(s):  
Sergios Soursos ◽  
Ivana Podnar Zarko ◽  
Patrick Zwickl ◽  
Ivan Gojmerac ◽  
Giuseppe Bianchi ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document