【24h】

Fog-Based Internet of Things: A Security Scheme

机译:基于雾的物联网:一种安全方案

获取原文
获取原文并翻译 | 示例

摘要

Internet of Things (IoT) stack models differ in their architecture, applications and needs. Hence, there are different approaches to apply IoT; for instance, it can be based on traditional data center or based on cloud computing. In fact, Cloud-based IoT is gaining more popularity due to its high scalability and cost effectiveness; hence, it is becoming the norm. However, Cloud is usually located far from the IoT devices and some recent research suggests using Fog-Based IoT by using a nearby light-weight middleware to bridge the gap and to provide the essential support and communication between devices, sensors, receptors and the servers. Therefore, Fog reduces centrality and provides local processing for faster analysis, especially for the time-sensitive applications. Thus, processing is done faster, giving the system flexibility for faster response time. Fog-Based Internet of Things security architecture should be suitable to the environment and provide the necessary measures to improve all security aspects with respect to the available resources and within performance constraints. In this work, we discuss some of these challenges, analyze performance of Fog based IoT and propose a security scheme based on MQTT protocol. Moreover, we present a discussion on security-performance tradeoffs.
机译:物联网(IoT)堆栈模型在架构,应用程序和需求方面有所不同。因此,存在多种应用物联网的方法。例如,它可以基于传统数据中心或基于云计算。实际上,基于云的物联网因其高度的可扩展性和成本效益而越来越受欢迎。因此,它正在成为规范。但是,云通常位于远离物联网设备的地方,一些最新研究建议通过使用附近的轻量级中间件来使用基于雾的物联网来弥合差距,并在设备,传感器,接收器和服务器之间提供必要的支持和通信。因此,Fog降低了中心性,并提供了本地处理以加快分析速度,尤其是对时间敏感的应用程序。因此,处理速度更快,为系统提供了更快响应时间的灵活性。基于雾的物联网安全体系结构应适合环境,并提供必要的措施,以在可用资源和性能约束范围内改善所有安全方面。在这项工作中,我们讨论了其中一些挑战,分析了基于Fog的IoT的性能,并提出了基于MQTT协议的安全性方案。此外,我们提出了关于安全性能折衷的讨论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号