2020
DOI: 10.1002/spe.2804
|View full text |Cite
|
Sign up to set email alerts
|

A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures

Abstract: Fog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed. As the Fog layer has direct access to data streams generated by IoT devices and responses/commands sent from the Cloud, it is in a critical position in terms of security of the entire IoT system. Curre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…As a promising technology, fog is considered as a flexible computational paradigm for executing offloaded tasks near the location of data generation considering energy, delay, costs, QoS, and QoE constraints. Nevertheless, fog computing is still in progress to address its challenges due to some significant limitations 1‐3 . Besides, at the end of this section, a tabular comparison between heuristic and meta‐heuristic algorithms and a comparison among various search algorithms, including local search algorithms, their boosted version, and global search algorithms will be presented.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a promising technology, fog is considered as a flexible computational paradigm for executing offloaded tasks near the location of data generation considering energy, delay, costs, QoS, and QoE constraints. Nevertheless, fog computing is still in progress to address its challenges due to some significant limitations 1‐3 . Besides, at the end of this section, a tabular comparison between heuristic and meta‐heuristic algorithms and a comparison among various search algorithms, including local search algorithms, their boosted version, and global search algorithms will be presented.…”
Section: Related Workmentioning
confidence: 99%
“…Fog computing is provisioned to take full advantage of resource capabilities deployed in a relatively wide geographical area employing offloading by which the requests are transferred to the fog nodes at the same level, considering users' expectations. If the mentioned fog nodes cannot respond to the request at certain conditions, these requests will be directed to the higher‐level paradigm 1‐3 . Despite its considerable cost and delay efficient advantages, fog computing still suffers from some inherent limitations such as heterogeneous distributed resources and networking incurring unpredicted delays, consumed energy, and costs if it is not exploited appropriately 4‐11 …”
Section: Introductionmentioning
confidence: 99%
“…The FC layer can be studied in three levels, namely the node level, the system level, and the service level ( Farhadi et al, 2020 ). The fog consists of several nodes connected to each other and to the cloud.…”
Section: Fc Architectural Elementsmentioning
confidence: 99%
“…The FC layer can be studied in three levels, namely the node level, the system level, and the service level [46]. The fog consists of several nodes connected to each other and to the cloud.…”
Section: Fc Architectural Elementsmentioning
confidence: 99%