TY - JOUR
T1 - Securing IoT-Empowered Fog Computing Systems
T2 - Machine Learning Perspective
AU - Ahanger, Tariq Ahamed
AU - Tariq, Usman
AU - Ibrahim, Atef
AU - Ullah, Imdad
AU - Bouteraa, Yassine
AU - Gebali, Fayez
N1 - Publisher Copyright:
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).
PY - 2022/4/1
Y1 - 2022/4/1
N2 - The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. Additionally, it covers future research objectives in the crucial field of IoT security.
AB - The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. Additionally, it covers future research objectives in the crucial field of IoT security.
KW - Fog computing
KW - Internet of Things
KW - machine learning
KW - security
UR - https://www.scopus.com/pages/publications/85129078584
U2 - 10.3390/math10081298
DO - 10.3390/math10081298
M3 - Article
AN - SCOPUS:85129078584
SN - 2227-7390
VL - 10
JO - Mathematics
JF - Mathematics
IS - 8
M1 - 1298
ER -