Security Issues in ProtoGENI
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2016, Vol 3, Issue 6
Abstract
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test environment can mislead about security mechanism’s capabilities in a system. In this paper, existing ProtoGENI security mechanisms and functions are tested and analyzed through different experiments to find out the exploitable attacking loopholes. Experiments elaborate the existing functioning and security issues that can cause nonfunctional, semi non-functional or malfunctioned systems. Results indicate threats to ProtoGENI resources and run-time interactions. Cross-experiment communication in Emulab wireless nodes have the capability of assisting in verifying isolation between ProtoGENI slices. Host security is one of the security components, which can be enhanced by modifying default security settings including SSH port number and root login rights. Documentation of experiment environment, experiment design, results, and analysis including many observations is helpful to understand the basic functioning and security issues to improve the overall functioning and security of ProtoGENI.
Authors and Affiliations
Fnu Shalini, Yang Xiao, Bo Sun
Map Matching Algorithm: Trajectory and Sequential Map Analysis on Road Network
The Global Positioning System (GPS) tracking data is essential for sensor data sources. It plays an important role for various systems like Traffic assessment and Prediction, routing and navigation, Fleet management etc. T...
Hardware-software co-simulation for medical X-ray control units
In this paper we present our solution to master the complex- ity of product adaption cycles of a medical X-ray control unit. We present the real hardware and software platform and our mapping of it to a virtual X-ray con...
A Machine Vision Based Automatic Optical Inspection System for Detecting Defects of Rubber Keypads of Scanning Machine
In order to detect defective rubber keypads, factories have to devote massive manpower and financial resources. In this paper, a vision-based system for the detection of a number of rubber keypad defects is designed and...
Improving ns-3 Emulation Support in Real-World Networking Scenarios
A common problem in networking research and development is the duplicate effort of writing simulation and implementation code. This duplication can be avoided through the use of fast-prototyping methodologies, which enab...
Bandit Learning with Concurrent Transmissions for Energy-Efficient Flooding in Sensor Networks
Concurrent transmissions, a novel communication paradigm, has been shown to eectively accomplish a reliable and energy-eÿcient flooding in low-power wireless networks. With multiple nodes exploiting a receive-and-forwar...