Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control
- Authors: Patwary, Abdullah Al-Noman , Naha, Ranesh Kumar , Garg, Saurabh , Battula, Sudheer Kumar , Patwary, Md Anwarul Kaium , Aghasian, Erfan , Amin, Muhammad Bilal , Mahanti, Aniket , Gong, Mingwei
- Date: 2021
- Type: Text , Journal article
- Relation: Electronics Vol. 10, no. 10 (2021), p. 1171
- Full Text: false
- Reviewed:
- Description: Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Authors: Wang, Qubeijian , Dai, Hong-Ning , Li, Xuran , Shukla, Mahendra , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Computer Communications Vol. 164, no. (2020), p. 1-12
- Full Text: false
- Reviewed:
- Description: The proliferation of massive Internet of Things (IoT) devices poses research challenges especially in unmanned aerial vehicles(UAV)-assisted IoT. In particular, the limited battery capacity not only restricts the life time of UAV-assisted IoT but also brings security vulnerabilities since computation-complex cryptographic algorithms cannot be adopted in UAV-assisted IoT systems. In this paper, artificial noise and wireless power transfer technologies are integrated to secure communications in UAV-assisted IoT (particularly in secret key distribution). We present the artificial noise aided scheme to secure UAV-assisted IoT communications by letting UAV gateway transfer energy to a number of helpers who will generate artificial noise to interfere with the eavesdroppers while the legitimate nodes can decode the information by canceling additive artificial noise. We introduce the eavesdropping probability and the security rate to validate the effectiveness of our proposed scheme. We further formulate an eavesdropping probability constrained security rate maximization problem to investigate the optimal power allocation. Moreover, analytical and numerical results are provided to obtain some useful insights, and to demonstrate the effect of crucial parameters (e.g., the transmit power, the main channel gain) on the eavesdropping probability, the security rate, and the optimal power allocation. © 2020 Elsevier B.V.