2018
DOI: 10.48550/arxiv.1806.06188
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Key Enabling Technologies for Secure and Scalable Future Fog-IoT Architecture: A Survey

Abstract: Fog or Edge computing has recently attracted broad attention from both industry and academia. It is deemed as a paradigm shift from the current centralized cloud computing model and could potentially bring a "Fog-IoT" architecture that would significantly benefit the future ubiquitous Internet of Things (IoT) systems and applications. However, it takes a series of key enabling technologies including emerging technologies to realize such a vision. In this article, we will survey these key enabling technologies … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Group 7 is the overall overview of the work. Overview & Prospects [46] Architecture [6] Resource Management [8] 5G and Beyond [28] Network Slicing [1] Scalability [3] Resource Management [9] computation offloading [12] Deep Learning [23] Game Theory [27] Smart Grid [36] Architecture [7] computation offloading [13] Resource Provisioning [17] Machine Learning [19][20] Blockchain [31] Smart City [35] Industrial Internet [37] LOV [41] Platforms and Tools [44] Security and Privacy [5] Resource Management [10] computation offloading [14] Machine Learning [21] Deep Learning [24] 5G and Beyond [29] Blockchain [32][33] COVID-19 [38] UAV [40] IOV [42] Network Slicing [2] Scalability [4] computation offloading [15][16] Resource Provisioning [18] Machine Learning [22] Deep Learning [25] Auction Method [26] 5G and Beyond [30] Blockchain [34] COVID-19 [39] Video Surveillance [43] Platforms and Tools…”
Section: A Taxonomy Of State-of-the-art Edge Computing Surveysmentioning
confidence: 99%
See 2 more Smart Citations
“…Group 7 is the overall overview of the work. Overview & Prospects [46] Architecture [6] Resource Management [8] 5G and Beyond [28] Network Slicing [1] Scalability [3] Resource Management [9] computation offloading [12] Deep Learning [23] Game Theory [27] Smart Grid [36] Architecture [7] computation offloading [13] Resource Provisioning [17] Machine Learning [19][20] Blockchain [31] Smart City [35] Industrial Internet [37] LOV [41] Platforms and Tools [44] Security and Privacy [5] Resource Management [10] computation offloading [14] Machine Learning [21] Deep Learning [24] 5G and Beyond [29] Blockchain [32][33] COVID-19 [38] UAV [40] IOV [42] Network Slicing [2] Scalability [4] computation offloading [15][16] Resource Provisioning [18] Machine Learning [22] Deep Learning [25] Auction Method [26] 5G and Beyond [30] Blockchain [34] COVID-19 [39] Video Surveillance [43] Platforms and Tools…”
Section: A Taxonomy Of State-of-the-art Edge Computing Surveysmentioning
confidence: 99%
“…The first group is related to edge computing properties. About network slicing, scalability, security and privacy, and architecture are reviewed and summarized in [1][2][3][4][5][6][7]. For example, End-to-End (E2E) network slicing facilitates resource allocation for a wide variety of applications, and Rajkumar et al [1] extended this to fog and cloud computing by examining state-of-the-art slicing approaches in network technologies such as SDN and NFV.…”
Section: ) the Properties Of Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…This newly generated block should match the hash with its previous block. The IoT-based devices are worked with the Fog nodes locally first before sending the information [5]. The blockchain keeps a record of all transactions made by each device [6] (Figure 1).…”
Section: Figure 1 Features Of Blockchainmentioning
confidence: 99%