The convergence of devices, IoTs with evolving edge computing, opens up newer opportunities to devise an intelligent network environment. Deployment of IoTs/IIoTs sensors and various devices for various purposes like smart cities, and intelligent transportation, is gaining more momentum on the one hand. On the other, the core network and cloud infrastructure is moving near the end-users due to edge computing. Increased deployment of these sensors, coupled with massive data processing, provides the right incentives for security attackers. Most of the network attacks attempt to exploit possible inconsistencies and misconfigurations of IoT devices. They try to spread the dynamism of malicious activities and cripple the entire network environment. Edge computing’s attacks and vulnerabilities are distributed in nature that can emanate from the end-nodes, IoT sensors, communication fabric, and edge computing devices. This demands programmable and adaptive security at the network level. It should cater to the scale emanating from the rapid proliferation of devices, the velocity of data, and the increasing possibilities of attacks.
IoT age leads to rapid proliferation of devices, unprecedented volume and velocity of data, a variety of ways of interconnectivity, and puts extraordinary load on the network. Vulnerabilities of IoTs / IIoTs, identification, authentication, and the integrity of data require comprehensive security solutions. Capabilities such as providing integrated security view, detection of anomaly and misuse, adaptive policy changes, policy verification, and ensuring required configurations would be critical for ensuring security. Moreover, it would also require screening and classification of packets for their security levels and ensuring processing accordingly. It would require dynamic flow control for detecting /mitigating malicious traffic flows. Policy management should be federated. It should offer dynamic encryption and also help perform integrity audits. It should offer mitigation of vulnerabilities and countering of attacks such as injection of information attack and service manipulation. Advancements in the evolving paradigm of programmable networks through Software Defined Network (SDN) are well poised to offer such adaptive dynamic network services. Edge computing environment capabilities can be leveraged to build security-aware and adaptive technology to offer features such as auto-configurations.
Industry Use Cases: