Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective

被引:11
作者
Ahanger, Tariq Ahamed [1 ]
Tariq, Usman [1 ]
Ibrahim, Atef [1 ]
Ullah, Imdad [1 ]
Bouteraa, Yassine [1 ]
Gebali, Fayez [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Univ Victroia, Elect & Comp Engn Dept, Victoria, BC V8P 5C2, Canada
关键词
machine learning; security; Fog computing; Internet of Things; DISTRIBUTED ATTACK DETECTION; AUTHENTICATION SCHEME; AGGREGATION SCHEME; PRIVACY; INTERNET; THINGS; DESIGN;
D O I
10.3390/math10081298
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. Additionally, it covers future research objectives in the crucial field of IoT security.
引用
收藏
页数:20
相关论文
共 82 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]  
Agrawal Prerna, 2021, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2020. Advances in Intelligent Systems and Computing (AISC 1174), P311, DOI 10.1007/978-981-15-5616-6_22
[3]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[4]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[5]   Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning [J].
Aminanto, Muhamad Erza ;
Kim, Kwangjo .
INFORMATION SECURITY APPLICATIONS, 2018, 10763 :212-223
[6]   Customized blockchain-based architecture for secure smart home for lightweight IoT [J].
Ammi, Meryem ;
Alarabi, Shatha ;
Benkhelifa, Elhadj .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
[7]  
Azad T., 2008, SECURING CITRIX XENA
[8]   A Machine Learning Security Framework for Iot Systems [J].
Bagaa, Miloud ;
Taleb, Tarik ;
Bernabe, Jorge Bernal ;
Skarmeta, Antonio .
IEEE ACCESS, 2020, 8 :114066-114077
[9]   A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment [J].
Ben Amor, Arij ;
Abid, Mohamed ;
Meddeb, Aref .
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, :1225-1231
[10]   When Pandemic Hits: Exercise Frequency and Subjective Well-Being During COVID-19 Pandemic [J].
Brand, Ralf ;
Timme, Sinika ;
Nosrat, Sanaz .
FRONTIERS IN PSYCHOLOGY, 2020, 11