Secure the edge? Understanding the risk towards wireless grids Edgeware technology

Research output: Contribution to journalArticle

1 Scopus citations

Abstract

This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

Original languageEnglish (US)
Pages (from-to)191-222
Number of pages32
JournalInternational Journal of Internet Technology and Secured Transactions
Volume5
Issue number3
DOIs
StatePublished - 2014

Keywords

  • Cloud computing
  • Cyber-attack
  • Edge computing
  • Edgeware
  • Hacking
  • Information security
  • Risk management
  • Virtualisation
  • Wireless grids

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Secure the edge? Understanding the risk towards wireless grids Edgeware technology'. Together they form a unique fingerprint.

  • Cite this