2017
DOI: 10.1109/mic.2017.37
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing for the Internet of Things: Security and Privacy Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
271
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 557 publications
(273 citation statements)
references
References 10 publications
0
271
0
2
Order By: Relevance
“…A proper trust management mechanism allows devices to maintain reputation information about neighbor nodes while transmitting the monitored data [13] [19], [20], [21], [22], [23]. E.g.…”
Section: Trust Based Communicationmentioning
confidence: 99%
See 2 more Smart Citations
“…A proper trust management mechanism allows devices to maintain reputation information about neighbor nodes while transmitting the monitored data [13] [19], [20], [21], [22], [23]. E.g.…”
Section: Trust Based Communicationmentioning
confidence: 99%
“…to decide which smart device or user has what type of authority to use the services like reading and writing data, executing programs, controlling the other smart devices etc. Access control refers to the permissions of usage of resources assigned to different actors of a wide IoT network [13], [21], [17], [26], [27], [28].…”
Section: Access Control Policiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Prototype of Fog-assisted and IoT-based health-care system architecture from end users have to be encrypted before outsourcing it to the Fog node [32]. There are various privacy-preserving techniques (e.g., differential privacy, homomorphic encryption) that can be applied between the Fog and the Cloud to preserve data privacy [1]. Among data privacy, usage privacy, and location privacy are also important challenges that must be considered and accomplished.…”
Section: Security and Privacy Issues In Fog Computingmentioning
confidence: 99%
“…Among data privacy, usage privacy, and location privacy are also important challenges that must be considered and accomplished. • Authentication -The Fog level holds the potential to enable authentication in IoT devices or appliance of light-weight encryption algorithms between Fog nodes and IoT devices to improve the authentication [1]. The authentication at different levels of Fog nodes is discussed in [29].…”
Section: Security and Privacy Issues In Fog Computingmentioning
confidence: 99%