2018
DOI: 10.1016/j.future.2018.04.007
|View full text |Cite
|
Sign up to set email alerts
|

Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 61 publications
(35 citation statements)
references
References 47 publications
0
35
0
Order By: Relevance
“…A comprehensive review of major security challenges for IoT, fog computing architecture and corresponding solutions in the IoT layered architecture is presented by Khan and Salah and Zhang et al Morabito et al proposed a lightweight gateway mechanism called “LegoIT” at the Edge/IoT networks and demonstrated security applications. Rapuzzi and Repetto articulated methods to build defense mechanisms with “situational awareness” for fog computing infrastructures. Flauzac et al proposed enabling SDN to secure the fog computing infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…A comprehensive review of major security challenges for IoT, fog computing architecture and corresponding solutions in the IoT layered architecture is presented by Khan and Salah and Zhang et al Morabito et al proposed a lightweight gateway mechanism called “LegoIT” at the Edge/IoT networks and demonstrated security applications. Rapuzzi and Repetto articulated methods to build defense mechanisms with “situational awareness” for fog computing infrastructures. Flauzac et al proposed enabling SDN to secure the fog computing infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…Third, their application in multi-and cross-cloud environments is not straightforward, since their configuration is based on internal communication mechanisms for each infrastructure. This issue will be even more severe in cyber-physical systems [2], with the integration of smart things in cloud applications, which are expected to be a consistent use case for 5G.…”
Section: Beyond the Security Perimeter Modelmentioning
confidence: 99%
“…Virtualization and the cloud paradigm usually bring agility and cost-effectiveness in building and operating ICT services, but they pose a number of additional security concerns, when compared to current legacy deployments [1], [2].…”
Section: Introductionmentioning
confidence: 99%
“…limitations by combining fine-grained and precise information with efficient processing, elasticity with robustness, autonomy with interactivity [2]. In this respect, the transition from standalone security appliances to more cooperative models has already proven to improve the detection rate while decreasing the overhead on each terminal [6].…”
Section: Introductionmentioning
confidence: 99%