Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

A two-layer fog-cloud intrusion detection model for IoT networks

S Roy, J Li, Y Bai - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) and its applications are becoming ubiquitous in our life.
However, the open deployment environment and the limited resources of IoT devices make …

Hybrid approach to intrusion detection in fog-based IoT environments

CA De Souza, CB Westphall, RB Machado… - Computer Networks, 2020 - Elsevier
Abstract In the Internet of Things (IoT) systems, information of various kinds is continuously
captured, processed, and transmitted by systems generally interconnected by the Internet …

A detection and prevention technique for man in the middle attack in fog computing

F Aliyu, T Sheltami, EM Shakshuki - Procedia computer science, 2018 - Elsevier
Due to the large number of IoT devices available, data needed to be processed by cloud
service providers has grown exponentially. This leads to increase in the latency of cloud …

A systematic survey on fog steered IoT: Architecture, prevalent threats and trust models

R Verma, S Chandra - International Journal of Wireless Information …, 2021 - Springer
Abstract Internet of Things (IoT) is considered as a scheme that consists of smart objects
furnished with sensors, processing and networking technologies amalgamated to work …

Fog computing-based intrusion detection architecture to protect iot networks

Y Labiod, A Amara Korba, N Ghoualmi - Wireless Personal …, 2022 - Springer
With the deployment of billions of Internet of Things (IoT) devices, more and more cyber
attacks involving or even targeting such devices are rife. Cyberattack vectors are in constant …

Intrusion detection based on bidirectional long short-term memory with attention mechanism

Y Yang, S Tu, RH Ali, H Alasmary, M Waqas… - 2023 - ro.ecu.edu.au
With the recent developments in the Internet of Things (IoT), the amount of data collected
has expanded tremendously, resulting in a higher demand for data storage, computational …

A deep and systematic review of the intrusion detection systems in the fog environment

L Yi, M Yin, M Darbandi - Transactions on Emerging …, 2023 - Wiley Online Library
Fog computing has arisen to complement cloud computing, offering a cost‐effective
architecture to power the Internet of things. Fog computing is a network computing and …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

Security and privacy issues of fog computing for the Internet of Things (IoT)

BNB Ekanayake, MN Halgamuge, A Syed - … for Big Data Systems Over IoT …, 2018 - Springer
Internet of Things (IoT), devices, and remote data centers need to connect. The purpose of
fog is to reduce the amount of data transported for processing, analysis, and storage, to …