Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

被引:85
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Tao, Lixin [1 ]
Zhu, Yongxin [2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
基金
美国国家科学基金会;
关键词
intrusion detection; mobile cloud computing; security; heterogeneous; 5G; PERFORMANCE; SYSTEM; VIRTUALIZATION; PROTECTION; ATTACKS;
D O I
10.1002/sec.1224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3049 / 3058
页数:10
相关论文
共 50 条
  • [31] Plan for the future with 5G, mobile edge computing
    DelRegno, Nick
    Control Engineering, 2022, 69 (07) : 17 - 18
  • [32] 5G Mobile Transport and Computing Platform for verticals
    Iovanna, Paola
    Pepe, Teresa
    Guerrero, Carmen
    Moscatelli, Francesca
    Ksentini, Adlen
    Chiasserini, Carla Fabiana
    Casetti, Claudio
    Mangues-Bafalluy, Josep
    Valcarenghi, Luca
    Martini, Barbara
    Zennaro, Giuliana
    Li, Xi
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2018, : 266 - 271
  • [33] Intrusion Detection for Grid and Cloud Computing
    Vieira, Kleber
    Schulter, Alexandre
    Westphall, Carlos Becker
    Westphall, Carla Merkle
    IT PROFESSIONAL, 2010, 12 (04) : 38 - 43
  • [34] A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
    Wang, Xingzhu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [35] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [36] Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications
    Qiang Liu
    Ryan Shea
    Zhi Liu
    Zehua Wang
    Han Hu
    Mobile Networks and Applications, 2022, 27 : 1779 - 1782
  • [37] Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications
    Liu, Qiang
    Shea, Ryan
    Liu, Zhi
    Wang, Zehua
    Hu, Han
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 1779 - 1782
  • [38] Mobility management on 5G Vehicular Cloud Computing systems
    Skondras, Emmanouil
    Michalas, Angelos
    Vergados, Dimitrios D.
    VEHICULAR COMMUNICATIONS, 2019, 16 : 15 - 44
  • [39] Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud
    Alghamdi, Saleh A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (03) : 469 - 488
  • [40] Network Slicing on 5G Vehicular Cloud Computing Systems
    Skondras, Emmanouil
    Michalas, Angelos
    Vergados, Dimitrios J.
    Michailidis, Emmanouel T.
    Miridakis, Nikolaos, I
    Vergados, Dimitrios D.
    ELECTRONICS, 2021, 10 (12)