Stojmenovic et al., 2016 - Google Patents
An overview of fog computing and its security issuesStojmenovic et al., 2016
- Document ID
- 13694277849821133777
- Author
- Stojmenovic I
- Wen S
- Huang X
- Luan H
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and …
- 238000000034 method 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
- H04L12/5695—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stojmenovic et al. | An overview of fog computing and its security issues | |
Al‐Turjman et al. | An overview of security and privacy in smart cities' IoT communications | |
Stojmenovic et al. | The fog computing paradigm: Scenarios and security issues | |
Gerodimos et al. | IoT: Communication protocols and security threats | |
Bouachir et al. | Blockchain and fog computing for cyberphysical systems: The case of smart industry | |
Zhang et al. | Security and trust issues in fog computing: A survey | |
Alwarafy et al. | A survey on security and privacy issues in edge-computing-assisted internet of things | |
Ashibani et al. | Cyber physical systems security: Analysis, challenges and solutions | |
Lin et al. | A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications | |
Samaila et al. | Challenges of securing Internet of Things devices: A survey | |
Aboodi et al. | Survey on the Incorporation of NDN/CCN in IoT | |
Stojmenovic | Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems | |
Pasikhani et al. | Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review | |
Al Shuhaimi et al. | Software defined network as solution to overcome security challenges in IoT | |
Naeem et al. | Fog computing in internet of things: Practical applications and future directions | |
Mahapatra et al. | A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges | |
Sicari et al. | Insights into security and privacy towards fog computing evolution | |
Lo et al. | A secure IoT firmware update framework based on MQTT protocol | |
Sudha et al. | A review on privacy requirements and application layer security in internet of things (IoT) | |
Li et al. | Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration | |
Stojmenovic | Large scale cyber-physical systems: Distributed actuation, in-network processing and machine-to-machine communications | |
Suryadevara et al. | Secured multimedia authentication system for wireless sensor network data related to Internet of Things | |
Panwar et al. | IoT security issues and solutions with blockchain | |
Ambili et al. | A secure software defined networking based framework for IoT networks | |
Haseeb et al. | Sensor-based optimization multi-decision model for sustainable smart cities |