Skip to main content

Fog-Based Internet of Things Security Issues

  • Chapter
  • First Online:
  • 1116 Accesses

Part of the book series: Asset Analytics ((ASAN))

Abstract

Internet of things (IoT) environments are different in terms of architecture and platform type; fundamentally, some are cloud based, and some use traditional data centres to support all necessary computation and data handling. In cloud-based IoT, the core of the cloud where most of the computation takes place is usually located away from the ‘things’. Therefore, some researchers recently proposed using the fog-computing-based Internet of things by utilizing an adjacent layer of nodes (fog) to provide the essential computational support for devices to servers and from device to device. Hence, fog provides a more distributed environment that can provide support to IoT devices in the field. In this work, we analyse and compare different risks and advantages of using a cloud versus using a fog cloud and present discussion on these issues. We show that traditional cloud can be advantageous in some applications while fog can be better in other applications in terms of resistance to some types of security attacks, and each has certain strengths and weaknesses. Moreover, we preview the pros and cons of using fog in an IoT environment, and we preview some of the common attacks that can target the IoT environment and devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. NIST (2011) The NIST definition of cloud computing. NIST special publication 800-145, Sept 2011. https://doi.org/10.6028/nist.sp.800-144

  2. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the Internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser MCC’12. ACM, pp 13–16

    Google Scholar 

  3. Cisco (2015) Fog computing, and the Internet of things: extend the cloud to where the things are. White paper. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf

  4. Perera C, Qin Y, Estrella JC, Reiff-Marganiec S, Vasilakos AV (2017) Fog computing for sustainable smart cities: a survey. ACM Comput Surv (CSUR) 50(3):32. https://doi.org/10.1145/3057266. ISSN 0360-0300

  5. Matt C (2018) Fog computing. Bus Inf Syst Eng 1–5. https://doi.org/10.1007/s12599-018-0540-6. ISSN 2363-7005

  6. Aljumah A, Ahanger TA (2018) Fog computing, and security issues: a review. In: 7th international conference on computers communications and control (ICCCC)

    Google Scholar 

  7. Abbasi BZ, Shah MA (2017) Fog computing: security issues, solutions, and robust practices. In: 23rd international conference on automation and computing (ICAC)

    Google Scholar 

  8. Alhazmi OH, Aloufi KS (2019) Fog-based Internet of things: a security scheme. In: Proceedings of 2nd international conference on computer applications & information security (ICCAIS). IEEE, pp 1–5. https://doi.org/10.1109/cais.2019.8769506

  9. Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng, 25 pp. Article ID 9324035. https://doi.org/10.1155/2017/9324035

  10. Gubbi RB, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  11. Mashal I, Alsaryrah O, Chung T-Y, Yang C-Z, Kuo W-H, Agrawal DP (2015) Choices for interaction with things on Internet and underlying issues. Ad Hoc Netw 28:68–90

    Google Scholar 

  12. Said O, Masud M (2013) Towards Internet of things: survey and future vision. Int J Comput Netw 5(1):1–17

    Article  Google Scholar 

  13. Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet: the Internet of things architecture, possible applications, and key challenges. In: Proceedings of the 10th international conference on frontiers of information technology (FIT’12), pp 257–260

    Google Scholar 

  14. Cisco (2014) The Internet of things reference model. White paper, June 2014. http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf

  15. Alhazmi O (2018) A survivable Internet of things scheme. J Adv Res Comput Appl 13(1)

    Google Scholar 

  16. Rao BBP, Saluia P, Sharma N, Mittal A, Sharma SV (2012) Cloud computing for Internet of things & sensing-based applications. In: Proceedings of the 6th international conference on sensing technology

    Google Scholar 

  17. Zhang B, Mor N, Kolb J, Chan DS, Goyal N, Lutz K, Allman E, Wawrzynek J, Lee E, Kubiatowicz J (2015) The cloud is not enough: saving IoT from the cloud. In: Proceedings of the 7th USENIX workshop on hot topics in cloud computing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar H. Alhazmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alhazmi, O.H. (2020). Fog-Based Internet of Things Security Issues. In: Kapur, P.K., Singh, O., Khatri, S.K., Verma, A.K. (eds) Strategic System Assurance and Business Analytics. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-15-3647-2_42

Download citation

Publish with us

Policies and ethics