Machine Learning (ML) assisted Edge security framework on FPGAs

Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate netw...

全面介紹

Saved in:
書目詳細資料
Main Authors: Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Ahmad Zabidi, Suriza, Najeeb, Athaur Rahman, Basahel, Ahmed
格式: Proceeding Paper
語言:English
English
出版: U.S. 2023
主題:
在線閱讀:http://irep.iium.edu.my/107811/7/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security.pdf
http://irep.iium.edu.my/107811/8/107811_Machine%20Learning%20%28ML%29%20assisted%20Edge%20security_Scopus.pdf
http://irep.iium.edu.my/107811/
https://ieeexplore.ieee.org/document/10246095
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expanded the attack surface and opportunity for adversaries to penetrate corporate networks. The limited computational abilities of edge devices and the heterogeneous nature of communication protocols further increase the security challenges of EC. Also, the trustworthiness of hardware devices is challenged due to security and privacy threats like trojan insertion, IP cloning, and hardware counterfeits. The application of Machine Language (ML) models in the edge computing paradigm creates a distributed intelligence architecture. Also, Field Programmable Gate Arrays (FPGAs) can exploit Physical Unclonable Functions (PUFs) characteristics to generate and store authentication keys. The PUF structure deployed with ML models in the edge layer can learn its complex input-output mapping from the Challenge and Response pairs (CRPs) to identify the suspicious and unknown responses. This article discusses the security and privacy issues in various layers of the EC architecture and proposes intrusion detection systems through the integration of FPGA-based edge sever and ML models. A PUF-assisted ML framework of the intrusion detection system is proposed to authenticate and detect potential attacks on the network.