Abstract

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.

Highlights

  • The Internet of Things (IoT) is having its boom phase as the Internet had two decades ago.The IoT market is growing and expected to increase from more than 15 billion devices in 2016 to more than 75 billion by 2025 [1]

  • Fog computing brings most of the advantages and benefits that cloud computing offers down to the edge of the network that will be available to IoT end-devices and users

  • Since all the data flow would be blocked in case of any damage or a physical attack, we suggest several Fog Computing Gateways (FCGs) to be installed in the fog computing supported IoT network architectures with the capability of self-healing and seamless fail-over

Read more

Summary

Introduction

The Internet of Things (IoT) is having its boom phase as the Internet had two decades ago. The IoT market is growing and expected to increase from more than 15 billion devices in 2016 to more than 75 billion by 2025 [1]. Following this trend, the number of deployed IoT devices has already passed the total population of Earth. Emerging from recent trends and needs, cloud computing and IoT will serve as complementary technologies of the Internet in the near future, by forming the concept called Cloud of Things (CoT). CoT will be leveraged as Things as a Service (TaaS) for cloud based IoT applications, for offloading high energy consuming tasks and operations to the cloud. The fog layer can leveraged as the security layer to provide necessary privacy and security functions to protect the data before it is offloaded to the cloud through insecure and vulnerable channel [2]

Why Security Is Crucial for IoT and Fog?
Which One Should Be Preferred for IoT
Why Hardware Assisted Security for Fog?
Demystifying Fog Computing
Content and Scope
Organization
Advantages of Using Fog Computing for IoT
Cyber-Attacks and Ways of Protecting the Networks from Them
Why Is Security in Fog Computing Needed?
Implications of Fog Computing Usage in IoT
Related to Telecommunications
Related to Cost
Related to QoS
Related to Security
Hardware Assisted Security of Fog Computing Devices
By-Hardware
By-Design
Cost-Analysis of the Hardware Assisted Security
Summary and Recommendations
Practical Application Scenarios of Fog Computing in IoT
MHz TI MSP430
Lessons Learnt
Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.