Enhancing Security of Internet of Things (IoT) using Fog Computing

2019 
Open nature of Internet connectivity architectures have resulted new threats and challenges for the security community are emerging. Hackers may exploit critical vulnerabilities in a wide range of IoT and edge-fog applications and devices. Internet of Things is referred as interconnected physics devices through internet to solve real world problems. Hence the participating devices of IoT can be administered from anywhere even everywhere. As a part of ubiquitous computing, devices of IoT may include any wearable gadget, smart measurement machines, mobile devices of vehicles which may further lead to Cloud, Big Data applications. Since devices of IoT are operated in internet enabled environment which is basically a data centric infrastructure, misuse of participating devices of an IoT solution is serious concern to avoid the manipulated or misguided wrongdoing of device. The advancements in embedded Systems-on-a-Chip (SoCs) have significantly increased the commercial devices and also extended the potential of the Internet of Things (IoT) in parallel. Not like earlier, IoT are now capable to handle he computing capacity of today's things and also allow devices to perform complex computations on-site, resulted in edge computing. Fog computing enables IoT devices to take decision and then act accordingly. Introduction of fog computing in an IoT infrastructure enables the use of “Fog Nodes” which are much capable against attacks to the infrastructure, even they can take decision to act against such conditions. This paper aims to study IoT infrastructure, IoT security concerns and then use of fog computing to meet IoT security goals.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []