Abstract

The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.

Highlights

  • Industries are adopting the emerging Internet of Things (IoT) paradigm and cloud computing services for the monitoring and controlling of critical applications associated with industrial control systems, smartSensors 2019, 19, 1788; doi:10.3390/s19081788 www.mdpi.com/journal/sensorsSensors 2019, 19, 1788 grids, and other critical infrastructures [1,2,3]

  • IoT applications and services are offered by the fog nodes, which are installed at the network edge to control activities as well as decision-making tasks based on the data collected from IoT devices with the response time of milliseconds [76]

  • Due to lack in hardware/software security designs and constrained resources, IoT devices are vulnerable to different security attacks

Read more

Summary

Introduction

Industries are adopting the emerging Internet of Things (IoT) paradigm and cloud computing services for the monitoring and controlling of critical applications associated with industrial control systems, smart. Fog computing puts a substantial amount of communication, control, storage and management at the edge of a network as opposed to establishing dedicated channels to a more centralized remote cloud infrastructure This approach reduces service latency, improves the Quality of Service (QoS) and provides a superior experience to end-users. The key contributions of our study are as follows: An in-depth analysis of the fog computing security challenges, big data privacy, and trust concerns was performed in relation to fog-based IoT along with their existing solutions and respective limitations. Study of complementary interrelationship between blockchain and fog computing exploring blockchain-based solutions to cater privacy and security problems in fog paradigm along with the review of security requirements analysis of the fog-enabled IoT application with the combined blockchain.

Data-Intensive IoT Applications
Smart Homes
Smart Cities
Smart Healthcare
Smart Environment and Agriculture
Energy Conservation
Fog Computing Architecture
Fog-Enabled IoT Applications Security Requirements
Fog Computing Security Challenges
Core-Network and Service Level Challenges
Identity Verification
Access Control
Lightweight Protocol Design
Limitations
Intrusion Detection Challenges
Trust Management
Privacy-Conserving Packet Forwarding
Rogue Fog Node Detection
Data Center Level Security Challenges
Secure Content Distribution
Distributed Computation Challenges
Secure Big Data Analysis
Secure Computation
Verifiable Computation
Device Level Security Challenges
Confidentiality
Light-Weight Trust Management
Blockchain: A Versatile Security Solution
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call