2019
DOI: 10.1016/j.future.2018.10.020
|View full text |Cite
|
Sign up to set email alerts
|

Reprint of : LEGIoT: A Lightweight Edge Gateway for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…However, the principle of subsystem isolation goes well beyond physical or subsystem interfaces isolation. IoT deployments now make extensive use of containerisation technologies and IoT devices can themselves be put under this context through container engines and container APIs [88], which can link endpoint devices to an extended system of IoT-enabled application services [89]. Significant ongoing research currently targets the extension of IoT resources orchestration to jointly include both edge nodes and the cloud [90].…”
Section: Discussion and Related Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the principle of subsystem isolation goes well beyond physical or subsystem interfaces isolation. IoT deployments now make extensive use of containerisation technologies and IoT devices can themselves be put under this context through container engines and container APIs [88], which can link endpoint devices to an extended system of IoT-enabled application services [89]. Significant ongoing research currently targets the extension of IoT resources orchestration to jointly include both edge nodes and the cloud [90].…”
Section: Discussion and Related Future Workmentioning
confidence: 99%
“…While such technologies were more applicable to cloud services, they are increasingly expanded and implemented at the edge node level. IoT endpoint device security can strongly benefit via joint physical and virtual isolation, and future research need to align relevant research with such IoT architecture patterns [89,90]. Organisations seeking to adopt security-by-design approaches would benefit from methodologies and tools that assist in appropriate prioritisation of any upgrades related to security.…”
Section: Discussion and Related Future Workmentioning
confidence: 99%
“…This leads to a situation where any present security threat will spread and amplify more rapidly called the "speed of ambush" factor and has a more significant impact than in a typical client-server network. It is essential to highlight that, the hosts in a virtualized environment must understand their trust boundaries and responsibilities for each other to secure the whole cloud environment as set by CSPs before moving to the cloud [32,33].…”
Section: The 'Velocity-of-attack'mentioning
confidence: 99%
“…A hypervisor or VMM is installed to execute several guest VMs and applications concurrently on a single host physical server machine and to provide separation amongst the guest VMs in a cloud environment [33]. These hypervisors are vulnerable and prone to attacks from various hackers.…”
Section: Hyperjackingmentioning
confidence: 99%
“…Edge computing offers essential services to support this critical concept of Industry 4.0 [22], [23]. The outcomes of the edge computing environment can support the need in the case of inter-connectivity, higher reliability, realtime predictive analysis, and low latency [16], [24], [25]. Specifically, the form of Artificial Intelligence (AI) in edge computing is almost unavoidable.…”
Section: Introductionmentioning
confidence: 99%