A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Security issues in fog environment: a systematic literature review
The potent concept of fog computing is currently attracting many researchers as it brings
cloud services closer to the end-user. It also roots out some of the major limitations of the …
cloud services closer to the end-user. It also roots out some of the major limitations of the …
A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Edge security for sip-enabled iot devices with p4
The exponential growth of IoT devices poses security concerns, in part because they provide
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things
M De Donno, JMD Felipe… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has been one of the key disruptive technologies over the last few
years, with its promise of optimizing and automating current manual tasks and evolving …
years, with its promise of optimizing and automating current manual tasks and evolving …
Fog Computing Meets URLLC: Energy Minimization of Task Partial Offloading for URLLC Services
C Shi, J Wei, Y Zhu, A Schmeink - IEEE Access, 2024 - ieeexplore.ieee.org
Ultra-high reliability and ultra-low latency communication (URLLC) are critical challenges for
upcoming 6G applications. Cloud computing and mobile edge computing (MEC) offer …
upcoming 6G applications. Cloud computing and mobile edge computing (MEC) offer …
Lightweight Secure Authentication Scheme to thwart Unauthorized Edge Datacenters in Fog Computing
N Premkumar, BS Kumar - Wireless Personal Communications, 2024 - Springer
Recently, Fog computing become a hot research area with the fast development of Internet
of Things (IoT) which cannot be handled efficiently by the traditional cloud computing. The …
of Things (IoT) which cannot be handled efficiently by the traditional cloud computing. The …
[PDF][PDF] An efficient reconfigurable workload balancing scheme for fog computing network using internet of things devices
NG Puttaswamy, AN Murthy - International Journal of Electrical and …, 2023 - academia.edu
Nowadays a huge amount of data has been communicated using fog nodes spread
throughout smarty cities. the communication process is performed using fog nodes which …
throughout smarty cities. the communication process is performed using fog nodes which …
[PDF][PDF] A comparative review of internet of things model workload distribution techniques in fog computing networks
NG Puttaswamy, AN Murthy, H Degha - Inf Dyn Appl, 2024 - library.acadlore.com
In the realm of fog computing (FC), a vast array of intelligent devices collaborates within an
intricate network, a synergy that, while promising, has not been without its challenges. These …
intricate network, a synergy that, while promising, has not been without its challenges. These …
Ethics in rotten apples: A network epidemiology approach for active cyber defense
F Bonacina, I Echegoyen, D Escribano… - arXiv preprint arXiv …, 2023 - arxiv.org
As Internet of Things (IoT) technology grows, so does the threat of malware infections. A
proposed countermeasure, the use of benevolent" white worms" to combat malicious" black …
proposed countermeasure, the use of benevolent" white worms" to combat malicious" black …