Internet of Things (IoT) 2020
DOI: 10.1007/978-3-030-37468-6_2
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…On the other hand, the IoT is improving the cloud computing capacities of SMART cities. Because the performance of SMART cities is largely based on data analytics, the collection, processing and presentation of data for decision making -requires cloud computing in the processing and storage of information [109]. Therefore, while developing and least developed countries try to use SMART cities as tools in their urban development sustainable goals, appropriate consideration to develop the right ICT infrastructure must be put in place.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, the IoT is improving the cloud computing capacities of SMART cities. Because the performance of SMART cities is largely based on data analytics, the collection, processing and presentation of data for decision making -requires cloud computing in the processing and storage of information [109]. Therefore, while developing and least developed countries try to use SMART cities as tools in their urban development sustainable goals, appropriate consideration to develop the right ICT infrastructure must be put in place.…”
Section: Discussionmentioning
confidence: 99%
“…The cloud is on the network layer Figure 1. The data are collected by the perception layer and sent to the network layer, where the cloud services process the data and reform them to be useful for the users on the application layer [73].…”
Section: F Cloud Computingmentioning
confidence: 99%
“…Attacker compromised nodes may also refuse connection requests from other devices and nodes on the network [26]. When DoS attacks are conducted en masse involving thousands of attacking nodes that produce erroneous data packets of generous size they become distributed denial of service (DDoS) attacks [21], [27]. These large-scale attacks completely overcome the ability for the network to respond to genuine requests and consume memory.…”
Section: Network Layer Potential Failuresmentioning
confidence: 99%
“…Flooding and routing attacks that occur in the network layer in turn result in DoS/DDoS type attacks. Owing to the identification of common DoS/DDoS type attacks in both the network [21], [26], [27] and software layers [22], [23], [28] the literature survey supports a reduction from eleven (11) individual to four (4) distinct common malicious attacks on the six (6) common security failures in the IoT ecosystem:…”
Section: Commonality Of Malicious Attacksmentioning
confidence: 99%