Researchers from National University of Computer and Emerging Sciences reviewed the security requirements in fog-enabled IoT systems
Internet of Things (IoT) and cloud computing finds application in a wide range of services such as smart City, smart grids, industrial internet, connected car, and connected healthcare. The concept of IoT combined with cloud computing enables systems to cater to various industrial needs such as solutions that improve system stability, flexibility, fault tolerance, and cost effectiveness. IoT devices generate a huge amount of confidential and security-sensitive data. According to Cisco’s report at the second International Conference on Future Networks and Distributed Systems 2018, 50 billion devices are expected to capture the Internet by 2020 and the number is expected to reach to 500 billion by 2025.
Fog computing – an architecture that uses edge devices to carry out a substantial amount of computation, storage, communication locally and routed over the internet backbone— can help to overcome some security concerns related to IoT-generated data. Moreover, IoT devices are vulnerable to different security attacks due to lack in hardware/software security designs and constrained resources. Now, a team of researchers from National University of Computer and Emerging Sciences assessed the challenges to secure future digital infrastructure. The team analyzed challenges regarding fog computing security, trust concerns, and big data privacy. The research also reported a relationship among fog computing and blockchain – a growing list of records, called blocks, which are linked using cryptography. The team also assessed blockchain-based solutions to overcome privacy and security problems in fog computing.
According to the researchers, current public key infrastructure and cryptographic mechanisms are not suitable for resource constraint IoT devices. The researchers suggested the need for proficient security mechanisms that do not consume more energy and storage. Blockchain can guarantee security, authentication, and integrity of transmitted data by IoT devices. This decentralized security mechanism also offers features such as anonymity that can aid in offering security and overcome privacy issues in IoT. Moreover, the team also suggested use of lightweight blockchain security that does not consume more storage and energy of IoT devices. The research was published in the journal MDPI Sensors on April 14, 2019.
Subscribe to our newsletter to get notification about new updates,information, discount, etc..