Skip to main content
Top

2022 | OriginalPaper | Chapter

Foggy Security

Authors : Vivek Ghosh, Bivav Raj Satyal, Vrinda G. Bhat, Nikita Srivastava, Rajesh Mudlapur, Chinmaya Nanda, M. N. Thippeswamy, K. Venkatesh

Published in: Emerging Research in Computing, Information, Communication and Applications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The wide acceptance of the IoT technology and deployment of large scale IoT networks has led to it being used for diverse applications. This highly distributed sensor infrastructure is able to acquire vast amount of data, but the weight, power and size (SWAP) constraints limit the amount of processing that can be done by the edge devices. Naturally, the next step in the evolution of the system was to integrate the IoT systems with the Cloud infrastructure and harness its computing and storage capability to realize highly intelligent systems which could be used for purposes of enhancing Homeland security, monetization of data, Smart Agriculture, Traffic Monitoring and Control systems among others. It was seen that the large amount of raw data acquired by these sensors if piped to the cloud directly imposes a large load on the communication infrastructure. This led to the evolution of the Fog architecture in which higher computing power is deployed between the Edge devices and the Cloud at a location where the SWAP constraints are far less stringent. Consequently, processed information is sent to the Cloud. Quite a few of these applications require security of data to be assured while in transit as well as while at rest. The Tangle technology is adopted for ensuring integrity of data in the Foggy section of the network while the Cloud has its own mechanisms. Very little work has been done to address the end to end integrity requirements in Fog computing networks by researchers as of date.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sethi P, Sarangi SR (2017) A review article on Internet of Things: architectures, protocols, and applications. J Electr Comput Eng Sethi P, Sarangi SR (2017) A review article on Internet of Things: architectures, protocols, and applications. J Electr Comput Eng
2.
go back to reference Al-Doghman F, Zenon C, Ajayan AR, Klempous R (2016) A review on fog computing technology. IEEE International Conference Al-Doghman F, Zenon C, Ajayan AR, Klempous R (2016) A review on fog computing technology. IEEE International Conference
3.
go back to reference Amor AB, Abid M, Meddeb A (2019) SAMAFog: service-aware mutual authentication fog-based protocol. In: IEEE, 2019 Amor AB, Abid M, Meddeb A (2019) SAMAFog: service-aware mutual authentication fog-based protocol. In: IEEE, 2019
4.
go back to reference Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. Int J Netw Secur 18 Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. Int J Netw Secur 18
5.
go back to reference Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2018) IEEEE Internet of Things Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2018) IEEEE Internet of Things
6.
go back to reference Heydari M, Mylonas A, Katos V (2019) Uncertainty-aware authentication model for fog computing in IoT. In: 2019 fourth international conference on fog and mobile edge computing (FMEC) Heydari M, Mylonas A, Katos V (2019) Uncertainty-aware authentication model for fog computing in IoT. In: 2019 fourth international conference on fog and mobile edge computing (FMEC)
7.
go back to reference Amor AB, Abid M, Meddeb A (2017) A privacy preserving authentication scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th international conference on computer systems and applications (AICCSA), IEEE, 1225–1231 Amor AB, Abid M, Meddeb A (2017) A privacy preserving authentication scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th international conference on computer systems and applications (AICCSA), IEEE, 1225–1231
8.
go back to reference Yi S, Qin Z, Li Q (2016) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms and systems. Yi S, Qin Z, Li Q (2016) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms and systems.
9.
go back to reference Patwary AA-N, Hossain N (2019) A detection approach for finding rogue fog node. In: Am J Eng Res (AJER) Patwary AA-N, Hossain N (2019) A detection approach for finding rogue fog node. In: Am J Eng Res (AJER)
10.
go back to reference Han H et al (2009) A measurement based rogue AP detection scheme. IEEE INFOCOM 2009. IEEE Han H et al (2009) A measurement based rogue AP detection scheme. IEEE INFOCOM 2009. IEEE
11.
go back to reference Han H et al (2019) A timing-based scheme for rogue AP detection. IEEE Trans Parallel distrib Syst Han H et al (2019) A timing-based scheme for rogue AP detection. IEEE Trans Parallel distrib Syst
12.
go back to reference Al-Otaibi B, Al-Nabhan N Privacy-Preserving vehicular rogue node detection scheme for fog computing. Sensors Article Al-Otaibi B, Al-Nabhan N Privacy-Preserving vehicular rogue node detection scheme for fog computing. Sensors Article
Metadata
Title
Foggy Security
Authors
Vivek Ghosh
Bivav Raj Satyal
Vrinda G. Bhat
Nikita Srivastava
Rajesh Mudlapur
Chinmaya Nanda
M. N. Thippeswamy
K. Venkatesh
Copyright Year
2022
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-1338-8_34