Identification of IoT Device Vulnerabilities

In this section, we focus on primary vulnerabilities within each device and how they may precipitate future attacks. After determining which devices are commonly deployed, we discovered critical vulnerabilities and analyzed the level of risk and impact from the aforementioned vulnerability by determining exploitability. Recently, an IoT attack surface is presented for an IoT network …

IoT Device-Level Security

The amount of IoT devices in the three domains of home, commerce, and healthcare is increasing at a rapid rate [37]. As the number of devices increases in their respected domains, it is important to focus on the security of each device to mitigate the chances of integrity compromises for the entire network. In this …

The Internet of Things (IoT) is an umbrella term for a broad range of technologies

The Internet of Things (IoT) is an umbrella term for a broad range of technologies and studies, which are rapidly expanding and modifying our world. IoT expansion has exploded over recent years, resulting indemand for proper security and implementation guidelines to be established. There is no universally accepted definition of the IoT, which may lead …

Open Research Issues

Despite many research studies carried out in fog computing and the recent development in the IoT, there are still many challenges and research issues that must be carefully studied regarding the utilization of fog paradigm in the IoT era. Standards & Programming LanguagesInitially, fog computing has been utilized to extend cloud-based services closer to IoT …

Simulation Environments in the Fog-Based IoT Systems

Simulations are valuable techniques for the development of the IoT-based systems and are considered as an alternative approach to design a working prototype of the model since they can describe the actualcharacteristics of the testbeds where IoT devices are installed and configured. Moreover, simulations provide an opportunity for developers and researchers to conduct and repeat …

Caching in Fog Computing

In the fog paradigm, services and resources of the cloud are closer to the users which facilitate them in the edge networks. With the significant growth of data gathered by smart devices (e.g. sensors), the demand for efficient data collection and delivery in the IoT era has become extremely important. Caching is a technique which …

Protocols & Enabling Technologies

Generally, standards are important factors for efficient and cost-effective deployment of fog-based IoT systems.By considering the distributed architecture of the fog-based IoT shown in Figure 1, there are still some challenging issues such as mobility and scalability for heterogeneous devices. In order to support fog-based IoTapplications with this demanding heterogeneous requirement, it is necessary to …