2020
DOI: 10.3390/s20205729
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Security of Fog End-Devices for the Internet of Things

Abstract: The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 71 publications
0
14
0
Order By: Relevance
“…In order to run the encryption and verification mechanism proposed in this paper without affecting the original system, an additional Encrypted Validator (EV) was added to the SCADA system, which was connected between CS and the switch, and its task was to run the encryption and verification mechanism instead of CS, as shown in Figure 18 . The authors of [ 48 ] mentioned that introducing a Fog End-Device into the existing system architecture is a good strategy to strengthen the security of the Internet of Things. This paper proposes a security mechanism to be implemented on the Raspberry Pi device, while avoiding affecting the existing system.…”
Section: Methodsmentioning
confidence: 99%
“…In order to run the encryption and verification mechanism proposed in this paper without affecting the original system, an additional Encrypted Validator (EV) was added to the SCADA system, which was connected between CS and the switch, and its task was to run the encryption and verification mechanism instead of CS, as shown in Figure 18 . The authors of [ 48 ] mentioned that introducing a Fog End-Device into the existing system architecture is a good strategy to strengthen the security of the Internet of Things. This paper proposes a security mechanism to be implemented on the Raspberry Pi device, while avoiding affecting the existing system.…”
Section: Methodsmentioning
confidence: 99%
“…An HLF-based blockchain architecture is proposed in [ 55 ] for healthcare monitoring applications. The authors in [ 56 ] highlighted the importance and benefits of fog computing for IoT networks. The study also provides a comprehensive investigation of hardware security to fog devices through an enriched literature review.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the Fog layer may afflict data integrity if end-to-end encryption mechanisms are not implemented. Consequently, as in the case of the Edge layer, the Fog layer can bring minor supplementary vulnerabilities, but it is also able to leverage Device layer weaknesses [ 34 ]. Thus, architectures involving the Fog layer need to be complemented by security mechanisms that mitigate the vulnerabilities of this layer.…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%