Fog Computing: A Primer

Author(s):  
Matthew N. O. Sadiku ◽  
Mahamadou Tembely ◽  
Sarhan M. Musa

Fog computing (FC) was proposed in 2012 by Cisco as the ideal computing model for providing real-time computing services and storage to support the resource-constrained Internet of Things (IoT) devices. Thus, FC may be regarded as the convergence of the IoT and the Cloud, combining the data-centric IoT services and pay-as-you-go characteristics of clouds.  This paper provides a brief introduction of fog computing.

Author(s):  
Flávia Pisani ◽  
Edson Borin

With the ever-growing scale of the IoT, transmitting a massive volume of sensor data through the network will be too taxing. However, it will be challenging to include resource-constrained IoT devices as processing nodes in the fog computing hierarchy. To allow the execution of custom code sent by users on these devices, which are too limited for many current tools, we developed a platform called LibMiletusCOISA (LMC). Moreover, we created two models where the user can choose a cost metric (e.g., energy consumption) and then use it to decide whether to execute their code on the cloud or on the device that collected the data. We employed these models to characterize different scenarios and simulate future situations where changes in the technology can impact this decision.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3715
Author(s):  
Ioan Ungurean ◽  
Nicoleta Cristina Gaitan

In the design and development process of fog computing solutions for the Industrial Internet of Things (IIoT), we need to take into consideration the characteristics of the industrial environment that must be met. These include low latency, predictability, response time, and operating with hard real-time compiling. A starting point may be the reference fog architecture released by the OpenFog Consortium (now part of the Industrial Internet Consortium), but it has a high abstraction level and does not define how to integrate the fieldbuses and devices into the fog system. Therefore, the biggest challenges in the design and implementation of fog solutions for IIoT is the diversity of fieldbuses and devices used in the industrial field and ensuring compliance with all constraints in terms of real-time compiling, low latency, and predictability. Thus, this paper proposes a solution for a fog node that addresses these issues and integrates industrial fieldbuses. For practical implementation, there are specialized systems on chips (SoCs) that provides support for real-time communication with the fieldbuses through specialized coprocessors and peripherals. In this paper, we describe the implementation of the fog node on a system based on Xilinx Zynq UltraScale+ MPSoC ZU3EG A484 SoC.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


2018 ◽  
Vol 3 (1) ◽  
pp. 55
Author(s):  
Griffani Megiyanto Rahmatullah ◽  
Muhammad Ayat ◽  
Wirmanto Suteddy

Sistem keamanan rumah merupakan implementasi yang harus dilakukan untuk meningkatkan keamanan dari kejadian yang tidak diinginkan. Beberapa implementasi hanya memberikan notifikasi sederhana berupa alarm dan tidak menjadi bukti yang kuat apabila terjadi pencurian. Salah satu solusi yang dilakukan adalah penempatan kamera untuk memantau keamanan rumah secara real time diintegrasikan dengan penyimpanan cloud. Bluemix merupakan salah satu provider untuk aplikasi cloud yang memiliki layanan pengolahan dan penyimpanan data, akses aplikasi mobile, pengawasan serta Internet of Things (IoT). Sistem yang diimplementasikan adalah integrasi Raspberry Pi dengan layanan Bluemix untuk melakukan pengawasan keamanan rumah dan memberikan notifikasi kepada pengguna. Sistem mendeteksi jarak menggunakan sensor HC-SR04 terhadap objek dan apabila jarak melewati acuan, hal tersebut adalah indikasi terjadinya pencurian. Berikutnya sistem akan menyalakan buzzer sebagai keluaran suara dan mengaktifkan kamera untuk mengambil gambar lalu diunggah ke object storage Bluemix. Langkah berikutnya yaitu layanan IBM push notification memberikan notifikasi ke perangkat Android pengguna. Pengujian dilakukan dengan menghalangi pembacaan sensor sehingga terjadi indikasi pencurian. Hasilnya adalah sistem berhasil menyalakan buzzer, mengambil gambar lalu diunggah ke Bluemix, dan notifikasi berhasil masuk pada Android. Notifikasi diterima oleh file browser pada perangkat Android dan dilakukan sinkronisasi dengan object storage untuk melakukan pengunduhan berkas gambar yang telah diunggah sebelumnya.Kata kunci: Bluemix, Raspberry Pi, object sorage, IBM push notification Home security system is an implementation that needs to be done to improve the security of unwanted events. Some implementations only provide a simple notification such as alarm and cannot become strong evidence in case of theft. One of the solutions is camera placement to monitor home security in real time integrated with cloud storage. Bluemix is a provider for cloud applications that have data processing and storage services, mobile application access, monitoring and Internet of Things (IoT). System implemented was integration of Raspberry Pi with Bluemix services to conduct home security surveillance and provide notification to user. System detected distance using HC-SR04 sensor to object and if distance passes the reference, it was an indication of theft. Next, system will turned on buzzer as a sound output and activating the camera to take picture and uploaded to Bluemix Object Storage. Next step was IBM push notification service giving notification to user's Android device. The testing was done by blocking the sensor readings so that there was an indication of theft. The result was system succeeded in turning on the buzzer, taking pictures, uploading pictures to Bluemix, and notification successfully logged on Android. Notifications are received by the file browser on Android device and synchronized with object storage to download image files that have been uploaded previously.Keywords: Bluemix, Raspberry Pi, object storage, IBM push notification 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


Author(s):  
Sejal Atit Bhavsar ◽  
Kirit J Modi

Fog computing is a paradigm that extends cloud computing services to the edge of the network. Fog computing provides data, storage, compute and application services to end users. The distinguishing characteristics of fog computing are its proximity to the end users. The application services are hosted on network edges like on routers, switches, etc. The goal of fog computing is to improve the efficiency and reduce the amount of data that needs to be transported to cloud for analysis, processing and storage. Due to heterogeneous characteristics of fog computing, there are some issues, i.e. security, fault tolerance, resource scheduling and allocation. To better understand fault tolerance, we highlighted the basic concepts of fault tolerance by understanding different fault tolerance techniques i.e. Reactive, Proactive and the hybrid. In addition to the fault tolerance, how to balance resource utilization and security in fog computing are also discussed here. Furthermore, to overcome platform level issues of fog computing, Hybrid fault tolerance model using resource management and security is presented by us.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document