Security Issues in Fog Computing from 5G to 6G: Architectures, Applications and Solutions

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.

Author(s): Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari
Series: Internet of Things
Publisher: Springer
Year: 2022

Language: English
Pages: 172
City: Cham

Foreword
Preface
Contents
About the Authors
1 A Systematic Survey on Security Challenges for Fog-Enabled Internet of Things (IoT) and Industrial Internet of Things (IIoT)
1.1 Introduction
1.2 A Generalized View of Fog Computing and Industrial Internet of Things
1.3 Fog Computing-Enabled IIoT Applications
1.4 Security Challenges of Fog-Enabled IoT and IIoT
1.4.1 Application Layer (Fog Server)
1.4.2 Network Layer (Communication)/Middleware
1.4.3 Sensing Layer (Internet of Things)
1.5 Zero Trust Architecture Concept and Its Requirement in Fog-Enabled IoT and IIoT
1.6 Conclusion
References
2 Evolutionary Algorithms for Enhancing Mobile Ad Hoc Network Security
2.1 Fog Computing and Mobile Ad-hoc Networks (MANETs)
2.1.1 Preface to MANETs
2.1.2 Types and Applications of MANETs
2.1.3 Routing Protocols of MANETs
2.1.4 Future Trends in MANETs Toward FOG Computing
2.2 Security Problems in MANETs
2.3 Different Approaches for Enhancing Security in MANETs and IoT
2.4 Evolutionary Algorithms
2.4.1 Genetic Algorithm (GA)s
2.4.2 Differential Evolution (DE)
2.4.3 Evolution Strategies (ES)
2.5 Applications of Evolutionary Algorithms in MANETs and IoT
2.5.1 Enhancing MANET and IoT Security by Identifying Malicious Attacks with EA
2.5.2 Enhancing MANET and IoT Security by Secure Routing and Protocol Optimization
2.5.3 Enhancing MANET Security by Topology Management
2.5.4 Enhancing MANET Security by Broadcasting Algorithms
2.5.5 Enhancing MANET Security by Node Clustering
2.6 Conclusion
References
3 Blockchain-Based Fog Computing
3.1 Introduction
3.1.1 Application Areas of Fog Computing
3.1.2 Main Contributions
3.1.3 Chapter Organization
3.2 Need for Security in Fog Computing
3.3 Blockchain and Its Evolution in Fog Computing
3.4 Security and Functionality Requirements in Fog Computing
3.5 Taxonomy of Security Protocols in Fog Computing
3.5.1 Authentication
3.5.2 Access Control
3.5.3 Key Management
3.5.4 Intrusion Detection
3.6 System Models
3.6.1 Network Model
3.6.2 Threat Model
3.7 Security Solutions for Blockchain-Based Fog Computing Environment
3.8 Comparative Analysis
3.8.1 Comparative Analysis on Communication and Computational Costs
3.8.2 Comparative Analysis on Security Features
3.9 Conclusion
References
4 Physical Layer Security Challenges and Solutions for Beyond 5G Fog Computing Networks
4.1 Introduction
4.2 Chapter Outline
4.3 Fog Computing Paradigm and Architecture
4.3.1 Fog Computing Paradigm
4.3.2 Fog Computing Architecture
4.3.3 Wireless Communication in Fog Computing
4.4 Security and Privacy Issues and Challenges in FC
4.4.1 Physical Layer Threats in FC
4.4.2 Authentication in FC
4.4.3 Trust in FC
4.4.4 Access Control, Intrusion, and Anomaly Detection
4.4.5 Privacy Issues and Data Protection
4.5 Principles of Physical Layer Security
4.5.1 Physical Layer Security Basics
4.5.2 Criteria of Physical Layer Authentication (PLA)
Key-Based PLA
4.6 Technologies and Solutions for Physical Layer Security in Fog Computing
4.6.1 Massive MIMO
4.6.2 Full Duplex
4.6.3 Non-orthogonal Multiple Access
4.6.4 Context-Based PLS
4.7 Conclusions
References
5 Blockchain for Secure Data Sharing in Fog-Based Smart City Systems
5.1 Introduction
5.2 Background
5.2.1 Fog Computing
5.2.2 Blockchain for IoT
5.3 Data Security in Fog Computing
5.4 Blockchain for Secure Data Sharing in the Fog
5.4.1 Use Case Scenario
5.4.2 Architecture
5.4.3 Transaction for Sharing New Data
5.5 Conclusion
References
6 Integrating Blockchain with Fog and Edge Computing for Micropayment Systems
6.1 Introduction
6.2 The Taxonomy of Fog Computing, Internet of Things (IoT), and Blockchain
6.3 Blockchain-Based System Architectures for Fog Computing
6.3.1 Cloud- and Big Data-Based Blockchain
6.3.2 Fog- and Edge-Based Blockchain
6.4 Fog-Blockchain-Enabled Micropayments
6.4.1 Benefits of Integrating Blockchain with Fog Computing
6.4.2 Integrating Blockchain with Fog/Edge Computing for Micropayments
6.4.3 Lightning Network: Example of Micropayment Solution
6.5 A Hierarchical Fog-Blockchain Micropayment System
6.6 Conclusion and Future Work
References
7 Medical Prescription Traceability Using Blockchain-Based Decentralized Application
7.1 Introduction
7.1.1 The Advantages of Traceability
7.2 Related Work
7.2.1 Management of Prescriptions
7.2.2 Traceability Using Ledger Systems
7.2.3 Prescription Traceability
7.3 Proposed Method
7.4 Methodology
7.4.1 Blockchain Technology
7.4.2 Traceability
7.4.3 Key Generation Functionality
7.4.4 Implementing Smart Contracts
7.4.5 Function addFakeNewsSet ()
7.4.6 Function Vote ()
7.4.7 Importing Accounts Using Private Keys
7.4.8 Front-End Voting System
7.5 Performance Factors and Results
7.6 Conclusion
7.7 Future Scope
References
8 Optical and Wireless Convergence Network Based on Blockchain
8.1 Digital Identity and Anonymous Access Authentication Mechanism
8.1.1 Digital Identity Service
8.1.2 Anonymous Access Identification
8.1.3 Trusted Service Provisioning
8.2 Trusted Multi-Domain Cooperation Mechanism
8.3 Distributed Trusted Routing Calculation Method
8.4 Fast Fault Recovery Mechanism
8.5 Conclusion
References
9 Fog Computing Security and Privacy for Internet of Things (IoT) and Industrial Internet of Things (IIoT) Applications: State of the Art
9.1 Introduction
9.2 Internet of Things (IoT), Industrial Internet of Things (IIoT), and Industry 4.0
9.3 Fog Computing Applications in IoT and IIoT
9.3.1 Real Time and Low Latency
9.3.2 Context-Aware
9.3.3 Data Management
9.3.4 Security
9.4 Security Issues of Fog Computing in IoT and IIoT
9.5 Security Challenges of Fog Computing in IoT and IIoT
9.6 Conclusion
References
10 Concluding Remarks: Current Challenges and Future Directions
Index