SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
Abstract The Internet of Things (IoT) is growing and has significantly impacted today's life.
Although the IoT plays an essential role in human life, it has processing limitations, and this …
Although the IoT plays an essential role in human life, it has processing limitations, and this …
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Due to the massive increase in the Internet of Things (IoT) devices in various applications
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …
Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads
K Boakye-Boateng, E Kuada… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Fog computing allows data to be processed on the network edge without reaching the cloud
infrastructure to reduce latency and network bandwidth. However, it is not without its security …
infrastructure to reduce latency and network bandwidth. However, it is not without its security …
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud‐Fog Environment
Cloud computing is widely used for its powerful and accessible computing and storage
capacity. However, with the development trend of Internet of Things (IoTs), the distance …
capacity. However, with the development trend of Internet of Things (IoTs), the distance …
A secure lightweight anonymous elliptic curve cryptography‐based authentication and key agreement scheme for fog assisted‐Internet of Things enabled networks
U Verma, D Bhardwaj - Concurrency and Computation …, 2022 - Wiley Online Library
The fog assisted‐Internet of Things (IoT) enabled network has been a novel topic in recent
years. With the rapid development of the IoT, it is imperative to accomplish security in the fog …
years. With the rapid development of the IoT, it is imperative to accomplish security in the fog …
Lightweight PUF based authentication scheme for fog architecture
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In
many use cases, the internet of things (IoT) devices do not know the fog nodes in advance …
many use cases, the internet of things (IoT) devices do not know the fog nodes in advance …
Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT
The proliferation of Internet of Things (IoT)-enabled applications such as smart cities, e-
healthcare, industrial automation, etc., has resulted in a significant increase in the amount of …
healthcare, industrial automation, etc., has resulted in a significant increase in the amount of …
SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of things for smart city applications
Computation offloading is one of the important application in Internet of Things (IoT)
ecosystem. Computational offloading provides assisted means of processing large amounts …
ecosystem. Computational offloading provides assisted means of processing large amounts …
Flexible IoT security middleware for end-to-end cloud–fog communication
Abstract IoT (Internet of Things) based smart devices such as sensors have been actively
used in edge clouds ie,'fogs' along with public clouds. They provide critical data during …
used in edge clouds ie,'fogs' along with public clouds. They provide critical data during …
CEaaS: Constrained encryption as a service in fog-enabled IoT
In this work, we present a solution toward facilitating dynamic encryption schemes—
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …