scholarly journals Edge Computing for the Internet of Things: A Case Study

2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb
Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

Author(s):  
P. J. Escamilla-Ambrosio ◽  
A. Rodríguez-Mota ◽  
E. Aguirre-Anaya ◽  
R. Acosta-Bermejo ◽  
M. Salinas-Rosales

Author(s):  
R. I. Minu ◽  
G. Nagarajan

In the present-day scenario, computing is migrating from the on-premises server to the cloud server and now, progressively from the cloud to Edge server where the data is gathered from the origin point. So, the clear objective is to support the execution and unwavering quality of applications and benefits, and decrease the cost of running them, by shortening the separation information needs to travel, subsequently alleviating transmission capacity and inactivity issues. This chapter provides an insight of how the internet of things (IoT) connects with edge computing.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


2020 ◽  
Vol 6 (4) ◽  
pp. 1166-1179
Author(s):  
Apostolos Galanopoulos ◽  
Theodoros Salonidis ◽  
George Iosifidis

Sign in / Sign up

Export Citation Format

Share Document