Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility

12/05/2021
by   Asad Ali, et al.
0

Multi-Access Edge computing (MEC) and Fog computing provide services to subscribers at low latency. There is a need to form a federation among 3GPP MEC and fog to provide better coverage to 3GPP subscribers. This federation gives rise to two issues - third-party authentication and application mobility - for continuous service during handover from 3GPP MEC to fog without re-authentication. In this paper, we propose: 1) a proxy-based state transfer and third-party authentication (PS3A) that uses a transparent proxy to transfer the authentication and application state information, and 2) a token-based state transfer and proxy-based third-party authentication (TSP3A) that uses the proxy to transfer the authentication information and tokens to transfer the application state from 3GPP MEC to the fog. The proxy is kept transparent with virtual counterparts, to avoid any changes to the existing 3GPP MEC and fog architectures. We implemented these solutions on a testbed and results show that PS3A and TSP3A provide authentication within 0.345-2.858s for a 0-100 Mbps proxy load. The results further show that TSP3A provides application mobility while taking 40-52 reduce the service interruption latency by 82.4 cloud-based service via tokens and prefetching.

READ FULL TEXT
research
12/16/2021

Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support

Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G o...
research
12/01/2017

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected t...
research
03/01/2023

Fog Device-as-a-Service (FDaaS): A Framework for Service Deployment in Public Fog Environments

Meeting the requirements of future services with time sensitivity and ha...
research
10/10/2018

True2F: Backdoor-resistant authentication tokens

We present True2F, a system for second-factor authentication that provid...
research
03/09/2023

Managing Data Replication and Distribution in the Fog with FReD

The heterogeneous, geographically distributed infrastructure of fog comp...
research
10/21/2022

FogROS G: Enabling Secure, Connected and Mobile Fog Robotics with Global Addressability

Fog Robotics renders networked robots with greater mobility, on-demand c...
research
12/02/2019

Fog to cloud and network coded based architecture: Minimizing data download time for smart mobility

Industry 4.0 applications foster new business opportunities but they als...

Please sign up or login with your details

Forgot password? Click here to reset