Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …

Intrusion Detection Systems in Fog Computing–A Review

FA Zwayed, M Anbar, Y Sanjalawe… - Advances in Cyber …, 2021 - Springer
With the growing volume of network throughput, packet transmission and security threats
and attacks in Fog computing, the study of Intrusion Detection Systems (IDSs) in this …

A novel blockchain-based encryption model to protect fog nodes from behaviors of malicious nodes

M Alshehri, B Panda, S Almakdi, A Alazeb, H Halawani… - Electronics, 2021 - mdpi.com
The world has experienced a huge advancement in computing technology. People prefer
outsourcing their confidential data for storage and processing in cloud computing because …

Comparative analysis of cloud and fog environment based on network usage and cost of execution using iFogSim

MS Alam, SJ Jabin, A Alam… - … Conference on Decision …, 2021 - ieeexplore.ieee.org
The number of IoT devices around the world is increasing exponentially with the growth of
technology. But the resources we have at hand may prove difficult to accommodate all of …

Edge computing, fog and MIST architecture analysis, application, and challenges

MK Makiabadi - 2021 - era.library.ualberta.ca
With the advent of IoT and next-generation internet which contains a multitude of
geographically distributed devices (approx. 50 billion devices by 2020 [1]) continuously …

[图书][B] Securing Fog Federation from Behavior of Rogue Nodes

MSH Alshehri - 2021 - search.proquest.com
As the technological revolution advanced information security evolved with an in-creased
need for condential data protection on the internet. Individuals and organizationstypically …

[PDF][PDF] EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures

RS Ala'Altaweel, G Gu - academia.edu
In this paper, we first show that Group Owner (GO) devices in Wi-Fi Direct are vulnerable to
the EvilDirect attack. In the EvilDirect attack, a rogue GO is set up by an adversary to look …