2020
DOI: 10.1007/s11277-020-07834-w
|View full text |Cite
|
Sign up to set email alerts
|

Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
2

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 26 publications
0
9
0
2
Order By: Relevance
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
See 3 more Smart Citations
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
“…Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 73 ,...…”
Section: Taxonomy and Trendsunclassified
See 2 more Smart Citations
“…Security in IoT has become a challenging task due to the comprehensive fewer hardware possessions, comprehensive openness, and the heterogeneity of IoT systems [19] [5] [6] [1]. Fog computing facilitates the service in the Cloud things at the network edges, which shows that the data dispensation and the communication can be achieved very close to data sources [22] [23] [24] [11] [2]. It is an encouraging framework to deal with the low latency and geographical distribution desired in the IoT environment.…”
Section: Introductionmentioning
confidence: 99%