Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

09/26/2022
by   Wesley dos Reis Bezerra, et al.
0

The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work proposes a agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at these areas' intersections were brought, supporting other researchers and developers who work in these areas.

READ FULL TEXT
research
01/09/2019

Internet of Things Security, Device Authentication and Access Control: A Review

The Internet of Things (IoT) is one of the emerging technologies that ha...
research
09/27/2018

Security Implications of Fog Computing on the Internet of Things

Recently, the use of IoT devices and sensors has been rapidly increased ...
research
05/02/2021

A Systematic Review of Security in the LoRaWAN Network Protocol

The age of the Internet of Things is adding an increasing number of new ...
research
02/13/2020

Fog Computing on Constrained Devices: Paving the Way for the Future IoT

In the long term, the Internet of Things (IoT) is expected to become an ...
research
12/20/2018

Dense Moving Fog for Intelligent IoT: Key Challenges and Opportunities

As the ratification of 5G New Radio technology is being completed, enabl...
research
09/11/2018

Verifiable Computations with RAM-like Running Times

Current and emerging trends such as cloud computing, fog computing, and ...
research
07/21/2020

Authentication against Man-in-the-Middle Attack with a Time-variant Reconfigurable Dual-LFSR-based Arbiter PUF

With the expansion of the Internet of Things industry, the information s...

Please sign up or login with your details

Forgot password? Click here to reset