Combining AntibIoTic with fog computing: AntibIoTic 2.0
M De Donno, N Dragoni - … on Fog and Edge Computing (ICFEC …, 2019 - ieeexplore.ieee.org
2019 IEEE 3rd International Conference on Fog and Edge Computing …, 2019•ieeexplore.ieee.org
The Internet of Things (IoT) has been one of the key disruptive technologies over the last few
years, with its promise of optimizing and automating current manual tasks and evolving
existing services. From the security perspective, the increasing adoption of IoT devices in all
aspects of our society has exposed businesses and consumers to a number of threats, such
as Distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we
proposed AntibIoTic 1.0 [1]. However, this solution has some limitations that make it difficult …
years, with its promise of optimizing and automating current manual tasks and evolving
existing services. From the security perspective, the increasing adoption of IoT devices in all
aspects of our society has exposed businesses and consumers to a number of threats, such
as Distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we
proposed AntibIoTic 1.0 [1]. However, this solution has some limitations that make it difficult …
The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. From the security perspective, the increasing adoption of IoT devices in all aspects of our society has exposed businesses and consumers to a number of threats, such as Distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we proposed AntibIoTic 1.0 [1]. However, this solution has some limitations that make it difficult (when not impossible) to be implemented in a legal and controlled manner. Along the way, Fog computing was born: a novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. As a result, in this paper, we present AntibIoTic 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (AntibIoTic 1.0). First, we present AntibIoTic 1.0 and its main problem. Then, after introducing Fog computing, we present AntibIoTic 2.0, showing how it overcomes the main issues of its predecessor by including Fog computing in its design.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果