2022
DOI: 10.3390/s23010199
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Fog Data Analytics for IoT Applications

Abstract: With the rapid growth in the data and processing over the cloud, it has become easier to access those data. On the other hand, it poses many technical and security challenges to the users of those provisions. Fog computing makes these technical issues manageable to some extent. Fog computing is one of the promising solutions for handling the big data produced by the IoT, which are often security-critical and time-sensitive. Massive IoT data analytics by a fog computing structure is emerging and requires extens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 130 publications
0
4
0
Order By: Relevance
“…• With augmented traffic in the network, there is a high suspicion of distortions, leading to a loss of coherence in the data that could potentially cause false-positive alarms; • Regrettably, the quantity of false-positive alarms surpasses the potential attacks by intruders-therefore, a limitation is to accurately differentiate these genuine attacks from the irrelevant ones; • A challenge in classifying alarms arises due to the diversity of firmware versions-it is imperative to keep the devices' versions in the network as current as possible and to utilize devices from vendors with minimal diversification [30][31][32][33][34].…”
Section: Limitations Of Own Researchmentioning
confidence: 99%
“…• With augmented traffic in the network, there is a high suspicion of distortions, leading to a loss of coherence in the data that could potentially cause false-positive alarms; • Regrettably, the quantity of false-positive alarms surpasses the potential attacks by intruders-therefore, a limitation is to accurately differentiate these genuine attacks from the irrelevant ones; • A challenge in classifying alarms arises due to the diversity of firmware versions-it is imperative to keep the devices' versions in the network as current as possible and to utilize devices from vendors with minimal diversification [30][31][32][33][34].…”
Section: Limitations Of Own Researchmentioning
confidence: 99%
“…As result, much of the data collected can be wasted. Big Data can be widely exploited only if we apply suitable methods to store and analyze them [ 15 ], and also immutability and verifiability properties becomes necessary, together with secure data sharing [ 7 , 25 , 26 ]. Blockchain technology is one example that has been suggested, providing many benefits in terms of data quality and secure data sharing [ 7 , 25 , 27 ].…”
Section: Open Issues and Future Directionsmentioning
confidence: 99%
“…Due to emerging trends in the processing power of EC and developments in hardware architecture, FC will find new usage in a variety of sectors. By pooling idle resources throughout the CC architecture to improve efficiency, distributed FGNs (Bhatia et al, 2023), for which can be virtualizing applications, disseminate resources and services.…”
Section: Fog Networking Outlinementioning
confidence: 99%