Machine Learning (ML) assisted Edge security framework on FPGAs
Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate netw...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Proceeding Paper |
Language: | English English |
Published: |
U.S.
2023
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/107811/7/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security.pdf http://irep.iium.edu.my/107811/8/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security_Scopus.pdf http://irep.iium.edu.my/107811/ https://ieeexplore.ieee.org/document/10246095 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
Summary: | Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate networks. The limited computational abilities of edge devices and the heterogeneous nature of communication protocols further increase the security challenges of EC. Also, the trustworthiness of hardware devices is challenged due to security and privacy threats like trojan insertion, IP cloning, and hardware counterfeits. The application of Machine Language (ML) models in the edge computing paradigm creates a distributed intelligence architecture. Also, Field Programmable Gate Arrays (FPGAs) can exploit Physical Unclonable Functions (PUFs) characteristics to generate and store authentication keys. The PUF structure deployed with ML models in the edge layer can learn its complex input-output mapping from the Challenge and Response pairs (CRPs) to identify the suspicious and unknown responses. This article discusses the security and privacy issues in various layers of the EC architecture and proposes intrusion detection systems through the integration of FPGA-based edge sever and ML models. A PUF-assisted ML framework of the intrusion detection system is proposed to authenticate and detect potential attacks on the network. |
---|