{"id":"https://openalex.org/W3006113602","doi":"https://doi.org/10.1109/menacomm46666.2019.8988518","title":"Mitigating Rogue Node Attacks in Edge Computing","display_name":"Mitigating Rogue Node Attacks in Edge Computing","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3006113602","doi":"https://doi.org/10.1109/menacomm46666.2019.8988518","mag":"3006113602"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/menacomm46666.2019.8988518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068909095","display_name":"Maha Shamseddine","orcid":null},"institutions":[{"id":"https://openalex.org/I36314861","display_name":"Beirut Arab University","ror":"https://ror.org/02jya5567","country_code":"LB","type":"education","lineage":["https://openalex.org/I36314861"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Maha Shamseddine","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Beirut Arab University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Beirut Arab University, Beirut, Lebanon","institution_ids":["https://openalex.org/I36314861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084077872","display_name":"Wassim Itani","orcid":"https://orcid.org/0000-0002-2311-6263"},"institutions":[{"id":"https://openalex.org/I36314861","display_name":"Beirut Arab University","ror":"https://ror.org/02jya5567","country_code":"LB","type":"education","lineage":["https://openalex.org/I36314861"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Wassim Itani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Beirut Arab University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Beirut Arab University, Beirut, Lebanon","institution_ids":["https://openalex.org/I36314861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048938230","display_name":"Auday Al-Dulaimy","orcid":"https://orcid.org/0000-0002-3548-2973"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Auday Al-Dulaimy","raw_affiliation_strings":["Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048747481","display_name":"Javid Taheri","orcid":"https://orcid.org/0000-0001-9194-010X"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Javid Taheri","raw_affiliation_strings":["Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden","institution_ids":["https://openalex.org/I43968019"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.352,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.592805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":61,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.43157458}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76748466},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.68054616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.63128823},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.60180974},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5327724},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.51139706},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.43157458},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.42220962},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24453121},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.18987995},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.119642764},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11498496},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/menacomm46666.2019.8988518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.62,"id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W149420927","https://openalex.org/W1729172517","https://openalex.org/W1904483788","https://openalex.org/W2007511616","https://openalex.org/W2035203720","https://openalex.org/W2099688605","https://openalex.org/W2117064875","https://openalex.org/W2133294820","https://openalex.org/W2143105534","https://openalex.org/W2293247967","https://openalex.org/W2409539449","https://openalex.org/W2549687423","https://openalex.org/W2584256470","https://openalex.org/W2767098552","https://openalex.org/W2980789769","https://openalex.org/W2981405507","https://openalex.org/W4253675308"],"related_works":["https://openalex.org/W4205923274","https://openalex.org/W4205234238","https://openalex.org/W4200394864","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W3142266060","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W2931996793","https://openalex.org/W2788934790"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"we":[3],"present":[4],"a":[5,34],"secure":[6],"authentication":[7,105],"protocol":[8,27,106],"for":[9],"edge":[10],"computing":[11],"using":[12,159],"the":[13,25,38,48,56,68,73,86,89,99,108,112,115,119,125,132,139,142,146,160,164],"Software-Defined":[14],"Networking":[15],"platform":[16],"and":[17,32,45,59,118,134,144,152,163],"wireless":[18,102],"network":[19,90],"virtualization.":[20],"The":[21,77,104],"main":[22],"contribution":[23],"of":[24,41,61,67,141,148],"presented":[26],"lies":[28],"in:":[29],"(1)":[30],"designing":[31],"implementing":[33],"practical":[35],"solution":[36],"to":[37,130],"security":[39,57,69,83,96,150],"problem":[40],"rogue":[42],"Fog":[43],"nodes,":[44],"(2)":[46],"providing":[47],"cloud":[49,78,120,135],"service":[50,121],"provider":[51,79],"with":[52],"exclusive":[53],"control":[54],"over":[55],"configuration":[58],"specification":[60],"its":[62,82,149],"leased":[63],"virtual":[64],"networks":[65],"independent":[66],"mechanisms":[70],"implemented":[71],"by":[72],"underlying":[74,100],"infrastructure":[75,116,133],"provider.":[76],"dynamically":[80],"enforces":[81],"policies":[84],"on":[85],"communication":[87,110],"at":[88],"edge,":[91],"therefore":[92],"circumventing":[93],"any":[94],"possible":[95],"vulnerabilities":[97],"in":[98],"physical":[101],"infrastructure.":[103],"manages":[107],"trusted":[109],"among":[111],"mobile":[113],"client,":[114],"provider,":[117,122],"yet":[123],"confines":[124],"Public-Key":[126],"Infrastructure":[127],"(PKI)":[128],"deployment":[129],"solely":[131],"providers.":[136],"This":[137],"enhances":[138],"scalability":[140],"system":[143,155],"reduces":[145],"complexity":[147],"management":[151],"configuration.":[153],"A":[154],"testbed":[156],"is":[157],"simulated":[158],"Mininet":[161],"emulator":[162],"Amazon":[165],"EC2":[166],"Cloud.":[167]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3006113602","counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2024-12-30T21:08:32.283469","created_date":"2020-02-24"}