Nothing Special   »   [go: up one dir, main page]

Stojmenovic et al., 2016 - Google Patents

An overview of fog computing and its security issues

Stojmenovic et al., 2016

Document ID
13694277849821133777
Author
Stojmenovic I
Wen S
Huang X
Luan H
Publication year
Publication venue
Concurrency and Computation: Practice and Experience

External Links

Snippet

Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • H04L12/5695Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Stojmenovic et al. An overview of fog computing and its security issues
Al‐Turjman et al. An overview of security and privacy in smart cities' IoT communications
Stojmenovic et al. The fog computing paradigm: Scenarios and security issues
Gerodimos et al. IoT: Communication protocols and security threats
Bouachir et al. Blockchain and fog computing for cyberphysical systems: The case of smart industry
Zhang et al. Security and trust issues in fog computing: A survey
Alwarafy et al. A survey on security and privacy issues in edge-computing-assisted internet of things
Ashibani et al. Cyber physical systems security: Analysis, challenges and solutions
Lin et al. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
Samaila et al. Challenges of securing Internet of Things devices: A survey
Aboodi et al. Survey on the Incorporation of NDN/CCN in IoT
Stojmenovic Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems
Pasikhani et al. Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review
Al Shuhaimi et al. Software defined network as solution to overcome security challenges in IoT
Naeem et al. Fog computing in internet of things: Practical applications and future directions
Mahapatra et al. A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges
Sicari et al. Insights into security and privacy towards fog computing evolution
Lo et al. A secure IoT firmware update framework based on MQTT protocol
Sudha et al. A review on privacy requirements and application layer security in internet of things (IoT)
Li et al. Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration
Stojmenovic Large scale cyber-physical systems: Distributed actuation, in-network processing and machine-to-machine communications
Suryadevara et al. Secured multimedia authentication system for wireless sensor network data related to Internet of Things
Panwar et al. IoT security issues and solutions with blockchain
Ambili et al. A secure software defined networking based framework for IoT networks
Haseeb et al. Sensor-based optimization multi-decision model for sustainable smart cities