This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
TABLE 5: Characteristics and Solutions provided by Fog Computing
Characterstics
Solutions Provided By Fog
Decentralization
Verifiable computation [128]–[130]
Server-aided exchange [131], [132]
Big data analytics [133]–[137]
Data dissemination
Designing protocol [138]
Sharing data securely [139]–[143]
Searching data securely [144], [145]
Real-time services
Identity recognition [146]–[151]
Access management [152], [153]
Intrusion detection [154]–[159]
Transient storage
Recovery from attacks [160]
Data distribution [161]
Identifying and protecting sensitive data [162]
nodes can support the edge devices and can prevent
them from being affected by such attacks. A nearby
fog node can perform the more sophisticated security
functions necessary for protection.
5. Incident response services: Fog nodes can be pro-
grammed to provide real-time incident response ser-
vices. Fog nodes can generate a flag to the IoT system
or the end users as soon as they encounter a suspicious
data or request. Fog computing allows for malware
detection and problem resolution in transit. In many
critical appliations, it might not be possible to stop the
entire system to resolve malware incidences. Fog nodes
can help in such resolutions while the system is up and
running.
Chia sẻ với bạn bè của bạn: