Edge and fog computing for IoT: A survey on current research activities & future directions

M Laroui, B Nour, H Moungla, MA Cherif, H Afifi… - Computer …, 2021 - Elsevier
Abstract The Internet of Things (IoT) allows communication between devices, things, and
any digital assets that send and receive data over a network without requiring interaction …

Security issues in fog environment: a systematic literature review

J Kaur, A Agrawal, RA Khan - International Journal of Wireless Information …, 2020 - Springer
The potent concept of fog computing is currently attracting many researchers as it brings
cloud services closer to the end-user. It also roots out some of the major limitations of the …

[HTML][HTML] A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the
traditional physical systems. Recently, security breaches in many IoT applications have …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

[HTML][HTML] A generic Internet of Things (IoT) middleware for smart city applications

Z Ali, A Mahmood, S Khatoon, W Alhakami, SS Ullah… - Sustainability, 2022 - mdpi.com
The Internet of Things (IoT) is one of the key components of the ICT infrastructure of smart
cities due to its great potential for intelligent management of infrastructures and facilities and …

[HTML][HTML] A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications

M Suárez-Albela, TM Fernández-Caramés… - Sensors, 2017 - mdpi.com
Fog computing extends cloud computing to the edge of a network enabling new Internet of
Things (IoT) applications and services, which may involve critical data that require privacy …

A novel mechanism to handle address spoofing attacks in SDN based IoT

H Aldabbas, R Amin - Cluster Computing, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of devices (servers, sensors, nodes, and so
on) used to conduct tasks like health monitoring, production monitoring, business …

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Z Bakhshi, A Balador, J Mustafa - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
This paper investigates security concerns and issues for Industrial Internet of Things (IIoT).
The IIoT is an emerging transformation, bringing great values to every industry. Although this …

IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space

MG Samaila, JBF Sequeiros, T Simoes… - IEEE …, 2020 - ieeexplore.ieee.org
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …

Security in fog computing: A systematic review on issues, challenges and solutions

R Rezapour, P Asghari, HHS Javadi… - Computer Science Review, 2021 - Elsevier
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …