Machine Learning (ML) assisted Edge security framework on FPGAs

Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate netw...

Full description

Saved in:
Bibliographic Details
Main Authors: Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Ahmad Zabidi, Suriza, Najeeb, Athaur Rahman, Basahel, Ahmed
Format: Proceeding Paper
Language:English
English
Published: U.S. 2023
Subjects:
Online Access:http://irep.iium.edu.my/107811/7/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security.pdf
http://irep.iium.edu.my/107811/8/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security_Scopus.pdf
http://irep.iium.edu.my/107811/
https://ieeexplore.ieee.org/document/10246095
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
Description
Summary:Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate networks. The limited computational abilities of edge devices and the heterogeneous nature of communication protocols further increase the security challenges of EC. Also, the trustworthiness of hardware devices is challenged due to security and privacy threats like trojan insertion, IP cloning, and hardware counterfeits. The application of Machine Language (ML) models in the edge computing paradigm creates a distributed intelligence architecture. Also, Field Programmable Gate Arrays (FPGAs) can exploit Physical Unclonable Functions (PUFs) characteristics to generate and store authentication keys. The PUF structure deployed with ML models in the edge layer can learn its complex input-output mapping from the Challenge and Response pairs (CRPs) to identify the suspicious and unknown responses. This article discusses the security and privacy issues in various layers of the EC architecture and proposes intrusion detection systems through the integration of FPGA-based edge sever and ML models. A PUF-assisted ML framework of the intrusion detection system is proposed to authenticate and detect potential attacks on the network.