Title: Secure the edge? Understanding the risk towards wireless grids Edgeware technology

Authors: Tyson Brooks; Michelle Kaarst-Brown; Carlos Caicedo; Joon Park; Lee W. McKnight

Addresses: School of Information Studies, Syracuse University, Syracuse, NY, 13244, USA ' School of Information Studies, Syracuse University, Syracuse, NY, 13244, USA ' School of Information Studies, Syracuse University, Syracuse, NY, 13244, USA ' School of Information Studies, Syracuse University, Syracuse, NY, 13244, USA ' School of Information Studies, Syracuse University, Syracuse, NY, 13244, USA

Abstract: This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

Keywords: wireless grids; Edgeware; information security; risk management; hacking; cyber attacks; edge computing; cloud computing; virtualisation; security vulnerabilities; computer network attacks; network security; risk assessment.

DOI: 10.1504/IJITST.2014.065190

International Journal of Internet Technology and Secured Transactions, 2014 Vol.5 No.3, pp.191 - 222

Received: 07 Feb 2014
Accepted: 26 Jun 2014

Published online: 28 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article