Abstract

AbstractIn recent years, fog computing is the extended technology of cloud computing platforms by providing the services and resources on the edge of the enterprise’s network and integrated with the Internet of Things (IoT) and Industrial Internet of Things (IIoT). Internet of Things is considered as a smart objects scheme, which furnishes the sensors, processing devices and network technologies together to build an ecosystem to deliver smart services to the end users. These applications can be utilized for enhancing the production of the goods and mitigating the risk of disaster occurrences in industries, which is known as the Industrial Internet of Things (IIoT), or Industry 4.0. This new paradigm provides many benefits to the industries, but it also introduces serious security challenges. The device heterogeneity, integrity and configuration expose the industrial infrastructure to potential threats, such as man-in-the-middle, black hole, wormhole, malicious configuration attacks and inherited security and privacy challenges from cloud computing in the fog-enabled platform. In this chapter, we intend to thoroughly discuss fog-enabled architecture Internet of Things and Industrial Internet of Things where computing, storage services and deployment are on the edge of the network to provide better services to users. This chapter aims to systematically and statistically classify and analyse various security challenges and attacks addressed by various researchers for the fog-enabled IoT and IIoT environment. When two or more heterogeneous devices communicate and share information, ‘trust’ plays a significant role. So, the authors have considered the ‘trust’ in this study and examined various security issues. Moreover, it is studied and emphasized on zero trust security model importance and requirements for fog-enabled IoT and IIoT environments.KeywordsInternet of Things (IoT)Industrial Internet of Things (IIoT)Fog computingSecurity threatsZero trust model

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.