[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions

M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed - Computers & Security, 2021 - Elsevier
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …

Journey from cloud of things to fog of things: Survey, new trends, and research directions

A Chakraborty, M Kumar… - Software: Practice and …, 2023 - Wiley Online Library
With the advent of the Internet of Things (IoT) paradigm, the cloud model is unable to offer
satisfactory services for latency‐sensitive and real‐time applications due to high latency and …

Blockchain-aware distributed dynamic monitoring: a smart contract for fog-based drone management in land surface changes

AA Khan, ZA Shaikh, AA Laghari, S Bourouis… - Atmosphere, 2021 - mdpi.com
In this paper, we propose a secure blockchain-aware framework for distributed data
management and monitoring. Indeed, images-based data are captured through drones and …

[HTML][HTML] Developing an IoT identity management system using blockchain

S Venkatraman, S Parvin - Systems, 2022 - mdpi.com
Identity (ID) management systems have evolved based on traditional data modelling and
authentication protocols that are facing security, privacy, and trust challenges with the …

[HTML][HTML] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey

A Peñuelas-Angulo, C Feregrino-Uribe… - Internet of Things, 2023 - Elsevier
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing fine-
grained access control and confidentiality security services. ABE is well suited for cloud …

[HTML][HTML] Secure-by-design serverless workflows on the edge–cloud continuum through the osmotic computing paradigm

G Morabito, C Sicari, A Ruggeri, A Celesti, L Carnevale - Internet of Things, 2023 - Elsevier
Nowadays, many Cloud companies adopt serverless computation based on the Function as
a Service (FaaS) paradigm. Such an approach, built on the dynamic provisioning of …

Defense scheme against advanced persistent threats in mobile fog computing security

M Waqas, S Tu, J Wan, T Mir, H Alasmary, G Abbas - Computer Networks, 2023 - Elsevier
In mobile fog computing (MFC), data processing and applications are concentrated in
devices at the network's edge. This means that data can be processed in local intelligent …

[PDF][PDF] Fog computing scheduling algorithm for smart city.

AM Alsmadi, RM Ali Aloglah… - … of Electrical & …, 2021 - pdfs.semanticscholar.org
With the advent of the number of smart devices across the globe, increasing the number of
users using the Internet. The main aim of the fog computing (FC) paradigm is to connect …

Novel security models for IoT–Fog–cloud architectures in a real-world environment

MA Aleisa, A Abuhussein, FS Alsubaei, FT Sheldon - Applied Sciences, 2022 - mdpi.com
With the rise of the Internet of Things (IoT), there is a demand for computation at network
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …

Protocol-based and hybrid access control for the iot: Approaches and research opportunities

S Pal, Z Jadidi - Sensors, 2021 - mdpi.com
Internet of Things (IoT) applications and services are becoming more prevalent in our
everyday life. However, such an interconnected network of intelligent physical entities needs …