2017
DOI: 10.3390/s17091978
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

Abstract: Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 105 publications
(54 citation statements)
references
References 66 publications
0
51
0
Order By: Relevance
“…Some of the latest smart campus architectures have suggested the use of the different types of the edge computing paradigm (e.g., mobile edge computing or fog computing), which have already been successfully applied to other smart fields [39]. The main advantage of edge computing is its ability to offload part of the processing tasks from the cloud, delegating such tasks to the so-called edge devices, which are physically located close to the IoT nodes.…”
Section: Cloud and Edge Computingmentioning
confidence: 99%
“…Some of the latest smart campus architectures have suggested the use of the different types of the edge computing paradigm (e.g., mobile edge computing or fog computing), which have already been successfully applied to other smart fields [39]. The main advantage of edge computing is its ability to offload part of the processing tasks from the cloud, delegating such tasks to the so-called edge devices, which are physically located close to the IoT nodes.…”
Section: Cloud and Edge Computingmentioning
confidence: 99%
“…Because of this diversity, it is difficult to develop a standard security protocol for all types of industrial internet devices and application systems [40]. According to IEC62443 standards [23], we can divide industrial internet as edge device layer, system control layer and management information layer, whose functions include computing, communication, sensing and driving functions. Through cloud-edge-end services, massive data storage, management and computation are clearly understood in this network architecture.…”
Section: Layered Industrial Internet Architectures Researchmentioning
confidence: 99%
“…Wang et al [22] design a highly-efficient distributed tensor-train decomposition method for IIoT Big Data. Suárez-Albela et al [23] introduces blockchain technology to better reduce the operating cost of distributed energy management and resist threats and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In the last years, UAV IoT architectures evolved towards more sophisticated architectures that essentially attempt to avoid the reliance on a remote cloud. This is due to the fact that a cloud may not scale properly, and thus it may constitute a bottleneck when a significant number of UAVs or IoT devices exchange communications with it [80]. In addition, cyberattacks may compromise the availability of the cloud servers, therefore preventing the UAV system from working properly.…”
Section: Advanced Uav Architecturesmentioning
confidence: 99%