Fog Computing and Its security issues

JM Chatterjee, I Priyadarshini… - Security Designs for …, 2019 - Wiley Online Library
Fog computing is architecture that expands the cloud framework by providing computing
utilities on the edges of a system. It very well may be portrayed as a cloud-like architecture …

[PDF][PDF] Security and privacy issues in fog driven IoT environment

R Verma, S Chandra - Int. J. Comput. Sci. Eng, 2019 - researchgate.net
Recently, the idea of Internet of Things is seeking much attention because of its vast
potential in the area of wireless transmission. IoT interlinks plentiful of heterogeneous …

A blockchain-encryption-based approach to protect fog federations from rogue nodes

M Alshehri, B Panda - 2019 3rd Cyber Security in Networking …, 2019 - ieeexplore.ieee.org
People have used cloud computing approach to store their data remotely. As auspicious as
this approach is, it brings forth many challenges: from data security to time latency issues …

Evil-twin detection on client-side

S Kitisriworapan, A Jansang… - 2019 16th International …, 2019 - ieeexplore.ieee.org
The unauthorized access is an important security threat in wireless networks. However, a
user that might be deceived for connecting to a rouge access point is also quite dangerous …

不合法AP 的治理方法綜整

郭幸香, 李墨軒, 史賀文 - TANET2019 臺灣網際網路研討會, 2019 - airitilibrary.com
資通訊科技的進步, IoT 與5G 時代的來臨, 越來越高海量的無線網路傳輸服務需求,
使得普及的Wi-Fi 接入點(AP), 路由器和熱點成為高度曝露的攻擊面, 攻擊者可透過設置不合法 …

[PDF][PDF] A detection approach for finding rogue fog node in fog computing environments

AAN Patwary, N Hossain, MA Sami - Am. J. Eng. Res, 2019 - researchgate.net
Recently, the concept of fog computing has attracting much attention due to the huge
potential. Fog uses the Internet as a key infrastructure to interconnect numerous …

On Securing Wi-Fi Direct Based Opportunistic Networks

AMHB Altaweel - 2019 - oaktrust.library.tamu.edu
Today's smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto
adhoc communication mechanism for mobile devices) that allows users to establish a …

[PDF][PDF] Rogue access point detection framework on a multivendor access point WLAN

KF Barasa - 2019 - academia.edu
Wireless internet access has become common throughout the world. IEEE 802.11 Wireless
fidelity (Wi-Fi) is now a common internet access standard almost becoming a requirement in …

Rogue endpoint detection

MJ Block, A Sheesley, JM Welborn… - US Patent …, 2019 - Google Patents
7, 954, 090 B1 5/2011 Qureshi et al. 7, 958, 556 B2 6/2011 Roesch et al. 8, 086, 729 B1
12/2011 Hindawi et al. 8, 138, 975 B2 3/2012 Bull et al. 8, 484, 385 B2 7/2013 …