scholarly journals A Mechanism for Securing IoT-enabled Applications at the Fog Layer

2019 ◽  
Vol 8 (1) ◽  
pp. 16 ◽  
Author(s):  
Nadeem Abbas ◽  
Muhammad Asim ◽  
Noshina Tariq ◽  
Thar Baker ◽  
Sohail Abbas

The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart communities. The LLN is a form of a network where the interconnected devices are highly resource-constrained (i.e., power, memory, and processing) and characterized by high loss rates, low data rates, and instability in the communication links. Additionally, IoT devices produce a massive amount of confidential and security-sensitive data. Various cryptographic-based techniques exist that can effectively cope with security attacks but are not suitable for IoT as they incur high consumption of resources (i.e., memory, storage and processing). One way to address this problem is by offloading the additional security-related operations to a more resourceful entity such as a fog-based node. Generally, fog computing enables security and analysis of latency-sensitive data directly at the network’s edge. This paper proposes a novel Fog Security Service (FSS) to provide end-to-end security at the fog layer for IoT devices using two well-established cryptographic schemes, identity-based encryption, and identity-based signature. The FSS provides security services such as authentication, confidentiality, and non-repudiation. The proposed architecture would be implemented and evaluated in an OPNET simulator using a single network topology with different traffic loads. The FSS performed better when compared with the APaaS and the legacy method.

Author(s):  
Ranjitha G. ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing enhances cloud computing to be closer to the processes that act on IOT devices. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications, and other limitations of cloud computing such as security aspects, bandwidth, and latency. Fog computing provides the direct correlation with the internet of things. IBM and CISCO are linking their concepts of internet of things with the help of fog computing. Application services are hosted on the network edge. It improves the efficiency and reduces the amount of data that is transferred to the cloud for analysis, storage, and processing. Developers write the fog application and deploy it to the access points. Several applications like smart cities, healthcare domain, pre-processing, and caching applications have to be deployed and managed properly.


Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


2020 ◽  
Vol 1 (1) ◽  
pp. 7-13
Author(s):  
Bayu Prastyo ◽  
Faiz Syaikhoni Aziz ◽  
Wahyu Pribadi ◽  
A.N. Afandi

Internet use in Banyumas Regency is now increasingly diverse according to the demands of the needs. The development of communication technology raises various aspects that also develop. For example, the use of the internet for a traffic light control system so that it can be adjusted according to the settings and can be monitored in real time. In the development of communication technology, the term Internet of Things (IoT) emerged as the concept of extending the benefits of internet communication systems to give impulses to other systems. In other words, IoT is used as a communication for remote control and monitoring by utilizing an internet connection. The Internet of Things in the era is now being developed to create an intelligent system for the purposes of controlling various public needs until the concept of the smart city emerges. Basically, smart cities utilize internet connections for many purposes such as controlling CCTV, traffic lights, controlling arm robots in the industry and storing data in hospitals. If the system is carried out directly from the device to the central server, there will be a very long queue of data while the system created requires speed and accuracy of time so that a system is needed that allows sufficient data control and processing to be carried out on network edge users. Then fog Computing is used with the hope that the smart city system can work with small latency values ​​so that the system is more real-time in sending or receiving data.


2020 ◽  
Vol 1 (2) ◽  
pp. 6-13
Author(s):  
Bayu Prastyo ◽  
Faiz Syaikhoni Aziz ◽  
Wahyu Pribadi ◽  
A.N. Afandi

Internet use in Banyumas Regency is now increasingly diverse according to the demands of the needs. The development of communication technology raises various aspects that also develop. For example, the use of the internet for a traffic light control system so that it can be adjusted according to the settings and can be monitored in real time. In the development of communication technology, the term Internet of Things (IoT) emerged as the concept of extending the benefits of internet communication systems to give impulses to other systems. In other words, IoT is used as a communication for remote control and monitoring by utilizing an internet connection. The Internet of Things in the era is now being developed to create an intelligent system for the purposes of controlling various public needs until the concept of the smart city emerges. Basically, smart cities utilize internet connections for many purposes such as controlling CCTV, traffic lights, controlling arm robots in the industry and storing data in hospitals. If the system is carried out directly from the device to the central server, there will be a very long queue of data while the system created requires speed and accuracy of time so that a system is needed that allows sufficient data control and processing to be carried out on network edge users. Then fog Computing is used with the hope that the smart city system can work with small latency values ​​so that the system is more real-time in sending or receiving data


2019 ◽  
Vol 8 (4) ◽  
pp. 4860-4867

With the emergence of network-based computing technologies like Cloud Computing, Fog Computing and IoT (Internet of Things), the context of digitizing the confidential data over the network is being adopted by various organizations where the security of that sensitive data is considered as a major concern. Over a decade there is a massive growth in the usage of internet along with the technological advancements that demand the need for the development of efficient security algorithms that could withstand various patterns of the security breaches. The DDoS attack is the most significant network-based attack in the domain of computer security that disrupts the internet traffic of the target server. This study mainly focuses to identify the advancements and research gaps in the development of efficient security algorithms addressing DDoS attacks in various ubiquitous network environments.


2021 ◽  
Vol 5 (2) ◽  
pp. 105
Author(s):  
Wasswa Shafik ◽  
S. Mojtaba Matinkhah ◽  
Mamman Nur Sanda ◽  
Fawad Shokoor

In recent years, the IoT) Internet of Things (IoT) allows devices to connect to the Internet that has become a promising research area mainly due to the constant emerging of the dynamic improvement of technologies and their associated challenges. In an approach to solve these challenges, fog computing came to play since it closely manages IoT connectivity. Fog-Enabled Smart Cities (IoT-ESC) portrays equitable energy consumption of a 7% reduction from 18.2% renewable energy contribution, which extends resource computation as a great advantage. The initialization of IoT-Enabled Smart Grids including (FESC) like fog nodes in fog computing, reduced workload in Terminal Nodes services (TNs) that are the sensors and actuators of the Internet of Things (IoT) set up. This paper proposes an integrated energy-efficiency model computation about the response time and delays service minimization delay in FESC. The FESC gives an impression of an auspicious computing model for location, time, and delay-sensitive applications supporting vertically -isolated, service delay, sensitive solicitations by providing abundant, ascendable, and scattered figuring stowage and system associativity. We first reviewed the persisting challenges in the proposed state-of-the models and based on them. We introduce a new model to address mainly energy efficiency about response time and the service delays in IoT-ESC. The iFogsim simulated results demonstrated that the proposed model minimized service delay and reduced energy consumption during computation. We employed IoT-ESC to decide autonomously or semi-autonomously whether the computation is to be made on Fog nodes or its transfer to the cloud.


Sign in / Sign up

Export Citation Format

Share Document