A detection and prevention technique for man in the middle attack in fog computing

Farouq Aliyu, Tarek Sheltami*, Elhadi M. Shakshuki

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

71 Scopus citations

Abstract

Due to the large number of IoT devices available, data needed to be processed by cloud service providers has grown exponentially. This leads to increase in the latency of cloud services and by extension latency in many IoT applications. To reduce this latency, computing devices are installed at the edge of the network close to the user. These devices are called ?Fog Nodes'. They allow the user to process some data without going all the way to the data center. While the data centers are equipped with abundant resources (i.e. processors, energy and memory), the fog devices are not. This means traditional techniques for preventing intrusion are not applicable at the fog level, because they will incur more latency and/or energy consumption. Therefore, there is a need for low resource demanding, yet strong security system that will protect the fog layer from being attacked. This paper proposes an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) for Man in the Middle (MitM) attack at the fog layer. The IDS consists of IDS nodes that periodically interrogate nodes one hop away. The IPS uses lightweight encryption to prevent Man in the Middle attack and its variants (i.e. Eavesdropping, Packet Modification and Wormhole attack).

Original languageEnglish
Pages (from-to)24-31
Number of pages8
JournalProcedia Computer Science
Volume141
DOIs
StatePublished - 2018

Bibliographical note

Publisher Copyright:
© 2018 The Authors. Published by Elsevier Ltd.

Keywords

  • Fog Computing
  • Intrusion Detection System
  • Intrusion Prevention System
  • Man in the Middle Attack
  • Network Security

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'A detection and prevention technique for man in the middle attack in fog computing'. Together they form a unique fingerprint.

Cite this