Skip to Content

270 Results Found

  • Article
  • Open Access
106 Citations
11,765 Views
20 Pages

9 December 2021

With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technol...

  • Article
  • Open Access
4 Citations
3,071 Views
19 Pages

Intelligent Computing Collaboration for the Security of the Fog Internet of Things

  • Hong Zhao,
  • Guowei Sun,
  • Weiheng Li,
  • Peiliang Zuo,
  • Zhaobin Li and
  • Zhanzhen Wei

24 April 2023

The application of fog Internet of Things (IoT) technology helps solve the problem of weak computing power faced by IoT terminals. Due to asymmetric differences in communication methods, sensing data offloading from IoT terminals to fog and cloud lay...

  • Review
  • Open Access
6 Citations
2,969 Views
19 Pages

Reliablity and Security for Fog Computing Systems

  • Egor Shiriaev,
  • Tatiana Ermakova,
  • Ekaterina Bezuglova,
  • Maria A. Lapina and
  • Mikhail Babenko

Fog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing wa...

  • Article
  • Open Access
90 Citations
6,762 Views
17 Pages

Blockchain-Based Security Mechanism for the Medical Data at Fog Computing Architecture of Internet of Things

  • Desire Ngabo,
  • Dong Wang,
  • Celestine Iwendi,
  • Joseph Henry Anajemba,
  • Lukman Adewale Ajao and
  • Cresantus Biamba

30 August 2021

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats...

  • Article
  • Open Access
232 Citations
17,783 Views
33 Pages

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

  • Noshina Tariq,
  • Muhammad Asim,
  • Feras Al-Obeidat,
  • Muhammad Zubair Farooqi,
  • Thar Baker,
  • Mohammad Hammoudeh and
  • Ibrahim Ghafir

14 April 2019

The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the...

  • Article
  • Open Access
64 Citations
7,311 Views
27 Pages

AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain

  • Sasmita Padhy,
  • Majed Alowaidi,
  • Sachikanta Dash,
  • Mohamed Alshehri,
  • Prince Priya Malla,
  • Sidheswar Routray and
  • Hesham Alhumyani

3 March 2023

Every aspect of the 21st century has undergone a revolution because of the Internet of Things (IoT) and smart computing technologies. These technologies are applied in many different ways, from monitoring the state of crops and the moisture level of...

  • Proceeding Paper
  • Open Access
1,902 Views
9 Pages

The Intelligent Connection Management Model to Enhance the Security of Cloud Computers in High-Density Fog Networks

  • Archana Jenis Marianthony Renjitham,
  • Suganthi Subburaj,
  • Ariputhran Durasamy Chandramohan Navin Dhinnesh,
  • Jeyasekaran Jeno Jasmine and
  • Raja Ambethkar Matta

22 December 2023

The Cloud-Based Secured Connection Management Model (CS-CMM) for high-density fog networks is a novel approach that leverages cloud resources and the proliferation of computing power at the edge of networks. The model seeks to address the challenges...

  • Article
  • Open Access
118 Citations
13,530 Views
39 Pages

A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

  • Manuel Suárez-Albela,
  • Tiago M. Fernández-Caramés,
  • Paula Fraga-Lamas and
  • Luis Castedo

29 August 2017

Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be d...

  • Article
  • Open Access
31 Citations
9,549 Views
17 Pages

Edge–Fog–Cloud Computing Hierarchy for Improving Performance and Security of NB-IoT-Based Health Monitoring Systems

  • Yousef-Awwad Daraghmi,
  • Eman Yaser Daraghmi,
  • Raed Daraghma,
  • Hacène Fouchal and
  • Marwane Ayaida

9 November 2022

This paper proposes a three-computing-layer architecture consisting of Edge, Fog, and Cloud for remote health vital signs monitoring. The novelty of this architecture is in using the Narrow-Band IoT (NB-IoT) for communicating with a large number of d...

  • Article
  • Open Access
51 Citations
6,215 Views
52 Pages

Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

  • Belal Sudqi Khater,
  • Ainuddin Wahid Abdul Wahab,
  • Mohd Yamani Idna Idris,
  • Mohammed Abdulla Hussain,
  • Ashraf Ahmed Ibrahim,
  • Mohammad Arif Amin and
  • Hisham A. Shehadeh

In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog...

  • Article
  • Open Access
58 Citations
9,179 Views
52 Pages

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

  • Abdullah Al-Noman Patwary,
  • Ranesh Kumar Naha,
  • Saurabh Garg,
  • Sudheer Kumar Battula,
  • Md Anwarul Kaium Patwary,
  • Erfan Aghasian,
  • Muhammad Bilal Amin,
  • Aniket Mahanti and
  • Mingwei Gong

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists...

  • Article
  • Open Access
14 Citations
4,352 Views
27 Pages

13 January 2022

Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there...

  • Article
  • Open Access
115 Citations
12,875 Views
18 Pages

A Mechanism for Securing IoT-enabled Applications at the Fog Layer

  • Nadeem Abbas,
  • Muhammad Asim,
  • Noshina Tariq,
  • Thar Baker and
  • Sohail Abbas

The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide...

  • Article
  • Open Access
23 Citations
5,743 Views
19 Pages

An Edge-Fog Secure Self-Authenticable Data Transfer Protocol

  • Algimantas Venčkauskas,
  • Nerijus Morkevicius,
  • Vaidas Jukavičius,
  • Robertas Damaševičius,
  • Jevgenijus Toldinas and
  • Šarūnas Grigaliūnas

19 August 2019

Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for...

  • Article
  • Open Access
7 Citations
1,788 Views
18 Pages

An Efficient and Secure Fog Based Routing Mechanism in IoT Network

  • Tauqeer Safdar Malik,
  • Jawad Tanveer,
  • Shahid Anwar,
  • Muhammad Rafiq Mufti,
  • Humaira Afzal and
  • Ajung Kim

24 August 2023

The Internet of Things (IoT) networks are the most prone to internal as well as external attacks in addition to energy consumption problems. Conventional security solutions are not able to address these issues effectively due to the limited resources...

  • Article
  • Open Access
4 Citations
2,891 Views
15 Pages

SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment

  • Shruti,
  • Shalli Rani,
  • Aman Singh,
  • Reem Alkanhel and
  • Dina S. M. Hassan

13 March 2023

The tremendous growth of about 8 billion devices connected to each other in various domains of Internet of Things (IoT)-based applications have attracted researchers from both industry and academia. IoT is a network of several devices connected with...

  • Article
  • Open Access
30 Citations
4,630 Views
20 Pages

Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective

  • Tariq Ahamed Ahanger,
  • Usman Tariq,
  • Atef Ibrahim,
  • Imdad Ullah,
  • Yassine Bouteraa and
  • Fayez Gebali

14 April 2022

The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a co...

  • Article
  • Open Access
28 Citations
6,210 Views
16 Pages

A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

  • Weidong Fang,
  • Wuxiong Zhang,
  • Jinchao Xiao,
  • Yang Yang and
  • Wei Chen

17 June 2017

Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has b...

  • Article
  • Open Access
4 Citations
2,701 Views
16 Pages

The Internet is an essential part of daily life with the expansion of businesses for maximizing profits. This technology has intensely altered the traditional shopping style in online shopping. Convenience, quick price comparison, saving traveling ti...

  • Review
  • Open Access
50 Citations
6,927 Views
25 Pages

Hardware Security of Fog End-Devices for the Internet of Things

  • Ismail Butun,
  • Alparslan Sari and
  • Patrik Österberg

9 October 2020

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a...

  • Article
  • Open Access
4 Citations
2,737 Views
34 Pages

9 April 2025

The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecti...

  • Article
  • Open Access
11 Citations
6,706 Views
16 Pages

30 July 2017

Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the c...

  • Review
  • Open Access
177 Citations
19,127 Views
27 Pages

A Survey of Security in Cloud, Edge, and Fog Computing

  • Aleksandr Ometov,
  • Oliver Liombe Molua,
  • Mikhail Komarov and
  • Jari Nurmi

25 January 2022

The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures...

  • Article
  • Open Access
10 Citations
3,014 Views
16 Pages

Novel Security Models for IoT–Fog–Cloud Architectures in a Real-World Environment

  • Mohammed A. Aleisa,
  • Abdullah Abuhussein,
  • Faisal S. Alsubaei and
  • Frederick T. Sheldon

10 May 2022

With the rise of the Internet of Things (IoT), there is a demand for computation at network edges because of the limited processing capacity of IoT devices. Fog computing is a middle layer that has appeared to address the latency issues between the I...

  • Article
  • Open Access
4 Citations
1,735 Views
16 Pages

26 December 2024

WSNs are significant components of modern IoT systems, which typically operate in resource-constrained environments integrated with fog and cloud computing to achieve scalability and real-time performance. Integrating these systems brings challenges...

  • Article
  • Open Access
19 Citations
2,223 Views
24 Pages

B-SAFE: Blockchain-Enabled Security Architecture for Connected Vehicle Fog Environment

  • Priyanka Gaba,
  • Ram Shringar Raw,
  • Omprakash Kaiwartya and
  • Mohammad Aljaidi

26 February 2024

Vehicles are no longer stand-alone mechanical entities due to the advancements in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication-centric Internet of Connected Vehicles (IoV) frameworks. However, the advancement in connecte...

  • Systematic Review
  • Open Access
272 Views
27 Pages

Intrusion Detection in Fog Computing: A Systematic Review of Security Advances and Challenges

  • Nyashadzashe Tamuka,
  • Topside Ehleketani Mathonsi,
  • Thomas Otieno Olwal,
  • Solly Maswikaneng,
  • Tonderai Muchenje and
  • Tshimangadzo Mavin Tshilongamulenzhe

Fog computing extends cloud services to the network edge to support low-latency IoT applications. However, since fog environments are distributed and resource-constrained, intrusion detection systems must be adapted to defend against cyberattacks whi...

  • Article
  • Open Access
8 Citations
3,194 Views
27 Pages

A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes

  • Mohammed Alshehri,
  • Brajendra Panda,
  • Sultan Almakdi,
  • Abdulwahab Alazeb,
  • Hanan Halawani,
  • Naif Al Mudawi and
  • Riaz U. Khan

16 December 2021

The world has experienced a huge advancement in computing technology. People prefer outsourcing their confidential data for storage and processing in cloud computing because of the auspicious services provided by cloud service providers. As promising...

  • Article
  • Open Access
105 Citations
12,476 Views
26 Pages

10 November 2018

The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher layers from part of their computational and data processing requirements. In the specific case of fog computing systems, they reduce greatly the requirements...

  • Article
  • Open Access
14 Citations
3,999 Views
40 Pages

The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and f...

  • Article
  • Open Access
25 Citations
3,542 Views
24 Pages

Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment

  • Soumya Banerjee,
  • Ashok Kumar Das,
  • Samiran Chattopadhyay,
  • Sajjad Shaukat Jamal,
  • Joel J. P. C. Rodrigues and
  • Youngho Park

Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. How...

  • Article
  • Open Access
57 Citations
3,053 Views
12 Pages

Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks

  • Zeyad Ghaleb Al-Mekhlafi,
  • Mahmood A. Al-Shareeda,
  • Selvakumar Manickam,
  • Badiea Abdulkarem Mohammed,
  • Abdulrahman Alreshidi,
  • Meshari Alazmi,
  • Jalawi Sulaiman Alshudukhi,
  • Mohammad Alsaffar and
  • Abdulrahman Alsewari

The privacy and security of the information exchanged between automobiles in 5G-enabled vehicular networks is at risk. Several academics have offered a solution to these problems in the form of an authentication technique that uses an elliptic curve...

  • Article
  • Open Access
2 Citations
2,153 Views
25 Pages

As the Internet of Things (IoT) continues to proliferate, the demand for efficient and secure data processing at the network edge has grown exponentially. Fog computing, a paradigm that extends cloud capabilities to the edge of the network, plays a p...

  • Review
  • Open Access
78 Citations
10,888 Views
48 Pages

A Comprehensive Survey on Security and Privacy for Electronic Health Data

  • Se-Ra Oh,
  • Young-Duk Seo,
  • Euijong Lee and
  • Young-Gab Kim

Recently, the integration of state-of-the-art technologies, such as modern sensors, networks, and cloud computing, has revolutionized the conventional healthcare system. However, security concerns have increasingly been emerging due to the integratio...

  • Article
  • Open Access
2 Citations
1,912 Views
24 Pages

28 July 2023

This study presents a novel keyword-based trust management system for fog computing networks aimed at improving network efficiency and ensuring data integrity. The proposed system establishes and maintains trust between fog nodes using trust keywords...

  • Article
  • Open Access
29 Citations
5,053 Views
15 Pages

A Lightweight Protocol for Secure Video Streaming

  • Algimantas Venčkauskas,
  • Nerijus Morkevicius,
  • Kazimieras Bagdonas,
  • Robertas Damaševičius and
  • Rytis Maskeliūnas

14 May 2018

The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional...

  • Article
  • Open Access
193 Citations
9,453 Views
12 Pages

Blockchain and Fog Based Architecture for Internet of Everything in Smart Cities

  • Parminder Singh,
  • Anand Nayyar,
  • Avinash Kaur and
  • Uttam Ghosh

Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wir...

  • Article
  • Open Access
11 Citations
4,549 Views
26 Pages

IoT Security Configurability with Security-by-Contract

  • Alberto Giaretta,
  • Nicola Dragoni and
  • Fabio Massacci

23 September 2019

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure defau...

  • Article
  • Open Access
13 Citations
4,058 Views
21 Pages

24 January 2022

The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that...

  • Article
  • Open Access
5 Citations
3,759 Views
17 Pages

Method to Increase Dependability in a Cloud-Fog-Edge Environment

  • Ovidiu Petru Stan,
  • Szilárd Enyedi,
  • Cosmina Corches,
  • Stelian Flonta,
  • Iulia Stefan,
  • Dan Gota and
  • Liviu Miclea

9 July 2021

Robots can be very different, from humanoids to intelligent self-driving cars or just IoT systems that collect and process local sensors’ information. This paper presents a way to increase dependability for information exchange and processing in syst...

  • Review
  • Open Access
80 Citations
5,770 Views
17 Pages

Blockchain-Based Solutions Supporting Reliable Healthcare for Fog Computing and Internet of Medical Things (IoMT) Integration

  • Shadab Alam,
  • Mohammed Shuaib,
  • Sadaf Ahmad,
  • Dushantha Nalin K. Jayakody,
  • Ammar Muthanna,
  • Salil Bharany and
  • Ibrahim A. Elgendy

18 November 2022

The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resource...

  • Article
  • Open Access
942 Views
30 Pages

Secure Data Transmission Using GS3 in an Armed Surveillance System

  • Francisco Alcaraz-Velasco,
  • José M. Palomares,
  • Fernando León-García and
  • Joaquín Olivares

23 June 2025

Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. Smart weapons and people detection systems are examples. Firstly, this work takes advantage of an efficient, scalab...

  • Article
  • Open Access
15 Citations
3,609 Views
15 Pages

FogTrust: Fog-Integrated Multi-Leveled Trust Management Mechanism for Internet of Things

  • Abdul Rehman,
  • Kamran Ahmad Awan,
  • Ikram Ud Din,
  • Ahmad Almogren and
  • Mohammed Alabdulkareem

The Internet of Things (IoT) is widely used to reduce human dependence. It is a network of interconnected smart devices with internet connectivity that can send and receive data. However, the rapid growth of IoT devices has raised security and privac...

  • Article
  • Open Access
1 Citations
1,055 Views
17 Pages

12 March 2025

The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. As vehicles generate unique keys for encryption and receive keyword details from data requesters for the secure tr...

  • Review
  • Open Access
38 Citations
8,340 Views
34 Pages

Applications of Integrated IoT-Fog-Cloud Systems to Smart Cities: A Survey

  • Nader Mohamed,
  • Jameela Al-Jaroodi,
  • Sanja Lazarova-Molnar and
  • Imad Jawhar

25 November 2021

Several cities have recently moved towards becoming smart cities for better services and quality of life for residents and visitors, with: optimized resource utilization; increased environmental protection; enhanced infrastructure operations and main...

  • Article
  • Open Access
54 Citations
7,120 Views
24 Pages

LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring

  • Bouthaina Dammak,
  • Mariem Turki,
  • Saoussen Cheikhrouhou,
  • Mouna Baklouti,
  • Rawya Mars and
  • Afef Dhahbi

15 February 2022

Over the past several years, the adoption of HealthCare Monitoring Systems (HCS) in health centers and organizations like hospitals or eldery homes growth significantly. The adoption of such systems is revolutionized by a propelling advancements in I...

  • Article
  • Open Access
122 Citations
10,028 Views
21 Pages

A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing

  • Belal Sudqi Khater,
  • Ainuddin Wahid Bin Abdul Wahab,
  • Mohd Yamani Idna Bin Idris,
  • Mohammed Abdulla Hussain and
  • Ashraf Ahmed Ibrahim

6 January 2019

Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a decentralized p...

  • Article
  • Open Access
80 Citations
7,480 Views
16 Pages

Blockchain-Based Secured Access Control in an IoT System

  • Sultan Algarni,
  • Fathy Eassa,
  • Khalid Almarhabi,
  • Abduallah Almalaise,
  • Emad Albassam,
  • Khalid Alsubhi and
  • Mohammad Yamin

17 February 2021

The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a th...

  • Article
  • Open Access
31 Citations
5,365 Views
29 Pages

Modeling a complete Internet of Things (IoT) infrastructure is crucial to assess its availability and security characteristics. However, modern IoT infrastructures often consist of a complex and heterogeneous architecture and thus taking into account...

  • Article
  • Open Access
5 Citations
1,903 Views
15 Pages

Recently, non-orthogonal multiple access (NOMA)-based space–air–ground integrated networks (SAGINs) have gained increasing attention due to their robust communication, broader coverage, and resource-saving advantages. However, it is imper...

of 6