• Home
  • Blog
  • Complete the implementation of the research project

Complete the implementation of the research project

0 comments

It is a research project, I have done a literature review and the methods, Now I have to do an implementation part that should match the proposed methods:

Proposed Methodology The proposed method is to implement a model that mitigates any type of DDoS that can affect IoT by achieving the following:

  • Using Fog computing method to segregate different areas in the manufacturing facility using a fog node to serve all the needed resources to this area.
  • The Resources will include computing, networking, and UTM (Unified Threat Management) for each area which can be delivered using one box of advanced technology such as hyper-converged solutions.
  • The UTM solution will be focusing on traffic management, authentication as well as intrusion detection systems.
  • Every Fog node will be isolated and hardened and allow outbound traffic only to ensure achieving the targeted security measures against DDoS attacks. Outbound data will be sending the final analysis and needed data to the centralized application and replicated node in the cloud.
  • Inbound traffic will be allowed through multi-factor authentication only. which will enhance the security of the architecture.
  • The replication of the nodes to the cloud will happen through the core network in order to create backup and redundant resources which can work in failover mode. In some cases, the cloud resources can act in a high-available mode.
  • The model will have the core network to act as the first line of defense in case of any attacks which will not affect the fog nodes during attacks. ‘
  • Achieving this method will reduce the dependency on the bandwidth as the processing is operated in the internal network and less demand on the cloud solution.
  • Furthermore, achieving such an architecture model will improve the physical security of the IoT as physical IoT will be segregated from one area to another.
  • Implementing a simulated solution that will illustrate how the structure can be achieved. The following architecture design (Figure 3) is a high-level demonstration of how the architecture will be communicating and designed. The design is a simulation of the areas of a Pharma manufacturing site.
  • About the Author

    Follow me


    {"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}