2020
DOI: 10.1007/s10776-020-00499-z
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Survey on Fog steered IoT: Architecture, Prevalent Threats and Trust Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 106 publications
0
4
0
Order By: Relevance
“…However, an IoT device, by its size and other hardware constraints, is limited on the one hand, in energy due to a reduced battery capacity combined with the difficulty of recharging or replacing it and on the other hand in memory, computing power, and storage capacity. As a solution to meet these constraints, it is important to minimise the energy consumption of sensor networks by implementing routing techniques in a cloud computing environment, which will maximise their lifetime [18][19][20][21][22][23][24].…”
Section: Background Knowledgementioning
confidence: 99%
“…However, an IoT device, by its size and other hardware constraints, is limited on the one hand, in energy due to a reduced battery capacity combined with the difficulty of recharging or replacing it and on the other hand in memory, computing power, and storage capacity. As a solution to meet these constraints, it is important to minimise the energy consumption of sensor networks by implementing routing techniques in a cloud computing environment, which will maximise their lifetime [18][19][20][21][22][23][24].…”
Section: Background Knowledgementioning
confidence: 99%
“…Although cloud computing is being widely used because of the services it provides as infrastructure, platform, and software. But it being a decentralized platform, almost every computation is performed at the cloud which introduces latency in the generation of responses 5,6 . The application has to communicate with the cloud for the minutest of the job.…”
Section: Introductionmentioning
confidence: 99%
“…The fog layer is present very close to the users and thus is highly vulnerable to attacks. Thus, the management of a huge amount of user sensitive data at the fog layer needs to be considered as an issue of grave concern 3,5,6 . Fog computing may face those security issues that do not even exist in a well‐equipped cloud scenario 13 .…”
Section: Introductionmentioning
confidence: 99%
“…A new computing paradigm known as fog computing was introduced by Cisco in 2012, aiming to resolve the latency issue by providing IT resources physically close to the data generating devices. Fog computing is an extension of cloud computing, not its replacement, since the IT resources provided by fog computing are not that powerful, so cloud resources are needed at the back end (Verma & Chandra, 2020). Fog and cloud computing clubbed together have capabilities to develop frameworks that can provide scalable as well as virtually unlimited resources (Schooler et al, 2017).…”
Section: Introductionmentioning
confidence: 99%