Modern fog network architectures, empowered by IoT applications and 5G communications technologies, are characterized by the presence of a huge number of mobile nodes, which undergo frequent handovers, introducing a significant load on the involved network entities. Considering the distributed and flat nature of these architectures, DMM can be the only viable option for efficiently managing handovers in these scenarios. The existing DMM solutions are capable of providing smooth handovers, but lack robustness from the security point of view. Indeed, DMM depends on external mechanisms for handover security and uses a centralized device, which has obvious security and performance implications in flat architectures where hierarchical dependencies can introduce problems. We propose a new DMM schema based on the blockchain, capable of resolving hierarchical security issues without affecting the network layout, and also satisfying fully distributed security requirements with less consumption of energy.

Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM

F. Palmieri;
2018-01-01

Abstract

Modern fog network architectures, empowered by IoT applications and 5G communications technologies, are characterized by the presence of a huge number of mobile nodes, which undergo frequent handovers, introducing a significant load on the involved network entities. Considering the distributed and flat nature of these architectures, DMM can be the only viable option for efficiently managing handovers in these scenarios. The existing DMM solutions are capable of providing smooth handovers, but lack robustness from the security point of view. Indeed, DMM depends on external mechanisms for handover security and uses a centralized device, which has obvious security and performance implications in flat architectures where hierarchical dependencies can introduce problems. We propose a new DMM schema based on the blockchain, capable of resolving hierarchical security issues without affecting the network layout, and also satisfying fully distributed security requirements with less consumption of energy.
2018
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4717156
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 80
  • ???jsp.display-item.citation.isi??? 70
social impact