2021
DOI: 10.1109/jiot.2020.3035474
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems

Abstract: Fog-Assisted Internet of Things (Fog-IoT) systems are deployed in remote and unprotected environments, making them vulnerable to security, privacy, and trust challenges. Existing studies propose security schemes and trust models for these systems. However, mitigation of insider attacks, namely blackhole, sinkhole, sybil, collusion, self-promotion, and privilege escalation, has always been a challenge and mostly carried out by the legitimate nodes. Compared to other studies, this paper proposes a framework feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Ensuring such availability means designing the system to be robust and adaptable, safeguarding continuous and reliable access when needed. From an availability perspective, the presented secure integrated framework in [14] for Fog-IoT systems is designed to enhance the resilience and uninterrupted functioning of Fog-IoT deployments. Fog-IoT systems, being set up in remote areas, are susceptible to a range of attacks, including insider threats and various external attacks like Denial of Service (DoS) and Distributed DoS.…”
Section: Policy Evaluation and Enforcementmentioning
confidence: 99%
“…Ensuring such availability means designing the system to be robust and adaptable, safeguarding continuous and reliable access when needed. From an availability perspective, the presented secure integrated framework in [14] for Fog-IoT systems is designed to enhance the resilience and uninterrupted functioning of Fog-IoT deployments. Fog-IoT systems, being set up in remote areas, are susceptible to a range of attacks, including insider threats and various external attacks like Denial of Service (DoS) and Distributed DoS.…”
Section: Policy Evaluation and Enforcementmentioning
confidence: 99%
“…A secure integrated framework for fog-assisted IoT systems was introduced by Junejo et al By integrating fog computing capabilities with conventional security mechanisms, their framework [14] effectively tackles the security challenges in IoT systems. Expanding on the research conducted by Zahra and Chishti, this framework offers a comprehensive perspective on IoT security that incorporates conventional and fog-based security protocols.…”
Section: Outline Of Iot-based Malicious Device Detection and Idsmentioning
confidence: 99%
“…π‘ͺ𝑺𝑷. 𝑬𝒏𝒄 (π‘π‘Žπ‘Ÿπ‘Žπ‘šπ‘ , π‘π‘˜ 0 , 𝑃𝐢𝑇 𝒯 ) : Given π‘π‘˜ π‘œ = (π‘π‘˜ π‘œ (1) , π‘π‘˜ π‘œ (2) , π‘π‘˜ π‘œ (3) , {π‘π‘˜ 𝑖.π‘œ } π‘–πœ–π‘ˆ ) and 𝑃𝐢𝑇 𝒯 = (𝐢, π‘Ÿ β€² , 𝒯, {π‘ž 𝑣 𝑖 } 𝑣 π‘–πœ–πΏ 𝒯 ), this technique calculates β€² , 𝐢 β€²β€² , 𝐢 𝑖 , 𝐢 𝑖 β€² in Eqs. ( 17), ( 18), (19), and ( 20)…”
Section: Data Outsourcingmentioning
confidence: 99%
“…Industrial internet of things (IoT) is a new paradigm altering contemporary industries by associating numerous devices with gateways of IoT, base stations, and points of access, enabling ubiquitous data collection and exchange over the sectors of various industries. Local edge computing nodes gather a lot of data from different IoT devices, process it, and send it to distant cloud servers where it can be used by data consumers like assembly line workers, technicians, and business managers [1]. Cloud-based IoT solutions make using the same data across many services feasible, making it easier to store and process the collected data and allowing user mobility.…”
Section: Introductionmentioning
confidence: 99%