Secure the edge? Understanding the risk towards wireless grids Edgeware technology

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

Original languageEnglish (US)
Pages (from-to)191-222
Number of pages32
JournalInternational Journal of Internet Technology and Secured Transactions
Volume5
Issue number3
DOIs
StatePublished - 2014

Fingerprint

Cloud computing
Computer networks
Telecommunication networks
Computer systems
Degradation
Virtualization

Keywords

  • Cloud computing
  • Cyber-attack
  • Edge computing
  • Edgeware
  • Hacking
  • Information security
  • Risk management
  • Virtualisation
  • Wireless grids

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

@article{a40cdc35a7ae43acbaa77e2eb6f09257,
title = "Secure the edge? Understanding the risk towards wireless grids Edgeware technology",
abstract = "This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.",
keywords = "Cloud computing, Cyber-attack, Edge computing, Edgeware, Hacking, Information security, Risk management, Virtualisation, Wireless grids",
author = "Tyson Brooks and Kaarst-Brown, {Michelle L} and {Caicedo Bastidas}, {Carlos Enrique} and Park, {Joon S} and McKnight, {Lee W}",
year = "2014",
doi = "10.1504/IJITST.2014.065190",
language = "English (US)",
volume = "5",
pages = "191--222",
journal = "International Journal of Internet Technology and Secured Transactions",
issn = "1748-569X",
publisher = "Inderscience Publishers",
number = "3",

}

TY - JOUR

T1 - Secure the edge? Understanding the risk towards wireless grids Edgeware technology

AU - Brooks, Tyson

AU - Kaarst-Brown, Michelle L

AU - Caicedo Bastidas, Carlos Enrique

AU - Park, Joon S

AU - McKnight, Lee W

PY - 2014

Y1 - 2014

N2 - This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

AB - This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

KW - Cloud computing

KW - Cyber-attack

KW - Edge computing

KW - Edgeware

KW - Hacking

KW - Information security

KW - Risk management

KW - Virtualisation

KW - Wireless grids

UR - http://www.scopus.com/inward/record.url?scp=84908099405&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84908099405&partnerID=8YFLogxK

U2 - 10.1504/IJITST.2014.065190

DO - 10.1504/IJITST.2014.065190

M3 - Article

AN - SCOPUS:84908099405

VL - 5

SP - 191

EP - 222

JO - International Journal of Internet Technology and Secured Transactions

JF - International Journal of Internet Technology and Secured Transactions

SN - 1748-569X

IS - 3

ER -