2020
DOI: 10.12694/scpe.v21i3.1782
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review

Abstract: As the IoT is moving out of its early stages, it is emerging as an area of future internet. The evolving communication paradigm among cloud servers, Fog nodes and IoT devices are establishing a multilevel communication infrastructure. Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise. These security hazards cannot be addressed by mere dependence on cloud model. In this paper we present an overview … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…Due to the nature of the FC of distribution, heterogeneity, closeness to IoT devices, and extension of Cloud computing many security and privacy issues were reported in the literature. This makes FC vulnerable to many attacks such as Man-in-the-Middle, Denial-of-Service, Rogue Fog Node, and Sybil attacks [24]. Some of these challenges have been provided some solutions as shown in Table 1 Several solutions were provided in the literature such as attribute-based encryption (ABE) access control [25], fine-grained access control [26], policy-driven management framework [27], leakage-resilient functional encryption schemes, device management, and key management [28], [29].…”
Section: Security and Privacy Issues Of Fog Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the nature of the FC of distribution, heterogeneity, closeness to IoT devices, and extension of Cloud computing many security and privacy issues were reported in the literature. This makes FC vulnerable to many attacks such as Man-in-the-Middle, Denial-of-Service, Rogue Fog Node, and Sybil attacks [24]. Some of these challenges have been provided some solutions as shown in Table 1 Several solutions were provided in the literature such as attribute-based encryption (ABE) access control [25], fine-grained access control [26], policy-driven management framework [27], leakage-resilient functional encryption schemes, device management, and key management [28], [29].…”
Section: Security and Privacy Issues Of Fog Computingmentioning
confidence: 99%
“…In spite of the new authentication techniques that have been proposed such as identity, Decoy, anonymous, and cooperative, single-domain, cross-domain, and handover authentication [28], authentication represents one of the major worries in FC [4]. Detection Systems Although several detection systems were proposed such as signature-based and neural network-based, fuzzy logic, lightweight countermeasure utilizing bloom filters, and distributed detection systems [23]- [25], there is a vital need for new systems that can integrate the different detection components which are distributed in the Fog network [24]. Trust Management Trust, in FC, must be enabled by the Fog nodes.…”
Section: Malicious Fog Nodementioning
confidence: 99%
See 1 more Smart Citation
“…Due to the distribution of Fog nodes and its closeness to IoT devices, centralized control system like what we have in the Cloud is not possible. Therefore, new innovative techniques and solutions are required to enhance IoT users and data privacy in the Fog environment 24,123,124 such as using the blockchain technology 26,27,125‐128 . This section discusses the recommendations and future opportunities to mitigate this issue.…”
Section: Rq3—challenges and Future Directionsmentioning
confidence: 99%
“…Therefore, new innovative techniques and solutions are required to enhance IoT users and data privacy in the Fog environment 24,123,124 such as using the blockchain technology. 26,27,[125][126][127][128] This section discusses the recommendations and future opportunities to mitigate this issue.…”
Section: Iot Device Privacymentioning
confidence: 99%