A Systematic Survey on Fog steered IoT: Architecture, Prevalent Threats and Trust Models
- PDF / 1,519,480 Bytes
- 18 Pages / 595.276 x 790.866 pts Page_size
- 55 Downloads / 177 Views
A Systematic Survey on Fog steered IoT: Architecture, Prevalent Threats and Trust Models Richa Verma1 · Shalini Chandra1 Received: 15 July 2020 / Revised: 31 August 2020 / Accepted: 30 September 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Internet of Things (IoT) is considered as a scheme that consists of smart objects furnished with sensors, processing and networking technologies amalgamated to work together and provide an ecosystem in which smart services are delivered to end-users. Fog computing is the name given to a next level computing that extends cloud services closer to the end-devices. The main idea behind the introduction of this concept is the reduction of latency that exists in a typical IoT-cloud scenario. But, if on one side it accelerates the computing jobs; on the off-side, it increases the attack surface due to the presence of fog layer in between the two existing layers. The data gets computed near to the end-user, thus making it more vulnerable. Hence, it may be said that the threats that may not even exist in a cloud environment come into the picture at fog level. In this paper, we intend to thoroughly discuss various fog level architectures with the threats prevalent at this layer through systematic literature review (SLR). This article aims to classify systematically and statistically, analyse the prevalent attacks that occur in IoT-Fog scheme that are published between 2012- 2020. When two or more devices share information, trust plays a pre-eminent role. So, the authors have also considered ‘trust’ in this study. The effect of trust on the different pillars of security is critically examined. Also, it is found that most of the researchers are emphasizing to prioritize trust in Fog- IoT scenario as it is a point of paramount significance. Keywords Internet of things (IoT) · Fog computing · Security threats · Trust
1 Introduction Internet of Things (IoT) refers to an interconnected environment consisting of uniquely defined entities which can accumulate, process, transfer data through internet with least human involvement. IoT visualizes a complete merger of several different "things" considering Internet as the backbone of the communication system and to intact a smart connection between human and high-end smart devices. The basic elements of the Internet of Things (IoT) are the loosely connected devices which are connected via heterogeneous network. The primary idea for building such environments is to accumulate and process data from IoT devices to excavate * Richa Verma [email protected] Shalini Chandra [email protected] 1
Department of Computer Science, Babasaheb Bhimrao Ambedkar University (A Central University), Lucknow, U.P. 226025, India
and detect patterns, or optimization, and provide smarter decisions in a required time frame. Irrespective of the above mentioned features IoT devices fall prey to some major drawbacks as well say; limited storage and computation power, minimal battery life, etc. Cloud computing emerges as a
Data Loading...