Fog Computing Security Challenges and Future Directions [Energy and Security]

2019 ◽  
Vol 8 (3) ◽  
pp. 92-96 ◽  
Author(s):  
Deepak Puthal ◽  
Saraju P. Mohanty ◽  
Sanjivani Ashok Bhavake ◽  
Graham Morgan ◽  
Rajiv Ranjan
2019 ◽  
Vol 5 (4) ◽  
pp. 209-233 ◽  
Author(s):  
Jimoh Yakubu ◽  
Shafi’i Muhammad Abdulhamid ◽  
Haruna Atabo Christopher ◽  
Haruna Chiroma ◽  
Mohammed Abdullahi

Author(s):  
Nerijus Šatkauskas ◽  
Algimantas Venčkauskas ◽  
Nerijus Morkevičius ◽  
Agnius Liutkevičius

Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1565
Author(s):  
Muhammad Aminu Lawal ◽  
Riaz Ahmed Shaikh ◽  
Syed Raheel Hassan

The advancement in IoT has prompted its application in areas such as smart homes, smart cities, etc., and this has aided its exponential growth. However, alongside this development, IoT networks are experiencing a rise in security challenges such as botnet attacks, which often appear as network anomalies. Similarly, providing security solutions has been challenging due to the low resources that characterize the devices in IoT networks. To overcome these challenges, the fog computing paradigm has provided an enabling environment that offers additional resources for deploying security solutions such as anomaly mitigation schemes. In this paper, we propose a hybrid anomaly mitigation framework for IoT using fog computing to ensure faster and accurate anomaly detection. The framework employs signature- and anomaly-based detection methodologies for its two modules, respectively. The signature-based module utilizes a database of attack sources (blacklisted IP addresses) to ensure faster detection when attacks are executed from the blacklisted IP address, while the anomaly-based module uses an extreme gradient boosting algorithm for accurate classification of network traffic flow into normal or abnormal. We evaluated the performance of both modules using an IoT-based dataset in terms response time for the signature-based module and accuracy in binary and multiclass classification for the anomaly-based module. The results show that the signature-based module achieves a fast attack detection of at least six times faster than the anomaly-based module in each number of instances evaluated. The anomaly-based module using the XGBoost classifier detects attacks with an accuracy of 99% and at least 97% for average recall, average precision, and average F1 score for binary and multiclass classification. Additionally, it recorded 0.05 in terms of false-positive rates.


2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Najah AbuAli ◽  
Hatem Abou-zeid

The advances in wireless communication schemes, mobile cloud and fog computing, and context-aware services boost a growing interest in the design, development, and deployment of driver behavior models for emerging applications. Despite the progressive advancements in various aspects of driver behavior modeling (DBM), only limited work can be found that reviews the growing body of literature, which only targets a subset of DBM processes. Thus a more general review of the diverse aspects of DBM, with an emphasis on the most recent developments, is needed. In this paper, we provide an overview of advances of in-vehicle and smartphone sensing capabilities and communication and recent applications and services of DBM and emphasize research challenges and key future directions.


2019 ◽  
Vol 12 (5) ◽  
pp. 1236-1262 ◽  
Author(s):  
Rida Zojaj Naeem ◽  
Saman Bashir ◽  
Muhammad Faisal Amjad ◽  
Haider Abbas ◽  
Hammad Afzal

Array ◽  
2020 ◽  
Vol 8 ◽  
pp. 100048
Author(s):  
Angelita Rettore de Araujo Zanella ◽  
Eduardo da Silva ◽  
Luiz Carlos Pessoa Albini

2021 ◽  
Vol 1714 ◽  
pp. 012052
Author(s):  
Niranjan Lal ◽  
Shobhit Mani Tiwari ◽  
Devbrat Khare ◽  
Megha Saxena

Sign in / Sign up

Export Citation Format

Share Document