2020
DOI: 10.1007/978-3-030-57811-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…An IH is authorized by the SDP controller to form a secure data channel enabled with the mTLS protocol to the AH. When an AH receives a request from the IH, it authenticates it and then the authorized IH secures a data channel for communication [5]- [6].…”
Section: Current Status Of Sdpmentioning
confidence: 99%
“…An IH is authorized by the SDP controller to form a secure data channel enabled with the mTLS protocol to the AH. When an AH receives a request from the IH, it authenticates it and then the authorized IH secures a data channel for communication [5]- [6].…”
Section: Current Status Of Sdpmentioning
confidence: 99%
“…1(a), and a three-layer structure in which a "fog layer" is added in between the edge layer and cloud layer, as shown in Fig. 1(b) [4], [5]. As the number of IoT devices (things) continues to increase, the two-layer structure is facing problems such as increased communica-tion charges, increased network load, difficulty in ensuring security, and high latency.…”
Section: Iot Networkingmentioning
confidence: 99%
“…2) Measures should presuppose illegal equipment connections and malfunctions. These issues are not limited to IoT devices, but it is important to consider the related issues from edge fog to cloud [5], [12], [13].…”
Section: Related Workmentioning
confidence: 99%