Edge and fog computing for IoT: A survey on current research activities & future directions

M Laroui, B Nour, H Moungla, MA Cherif, H Afifi… - Computer …, 2021 - Elsevier
Abstract The Internet of Things (IoT) allows communication between devices, things, and
any digital assets that send and receive data over a network without requiring interaction …

A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet

J Ren, D Zhang, S He, Y Zhang, T Li - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …

Distributed attack detection scheme using deep learning approach for Internet of Things

AA Diro, N Chilamkurti - Future Generation Computer Systems, 2018 - Elsevier
Cybersecurity continues to be a serious issue for any sector in the cyberspace as the
number of security breaches is increasing from time to time. It is known that thousands of …

Deep learning: The frontier for distributed attack detection in fog-to-things computing

A Abeshu, N Chilamkurti - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
The increase in the number and diversity of smart objects has raised substantial
cybersecurity challenges due to the recent exponential rise in the occurrence and …

The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

Leveraging LSTM networks for attack detection in fog-to-things communications

A Diro, N Chilamkurti - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity
schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and …

[HTML][HTML] Security in product lifecycle of IoT devices: A survey

N Yousefnezhad, A Malhi, K Främling - Journal of Network and Computer …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …

Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and research directions

J Santos, T Wauters, B Volckaert… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The advent of softwarized networks has enabled the deployment of chains of virtual network
and service components on computational resources from the cloud up to the edge, creating …

An overview of cloud‐fog computing: Architectures, applications with security challenges

S Kunal, A Saha, R Amin - Security and Privacy, 2019 - Wiley Online Library
With the growing needs of data across the world, it almost hard to live without data a day.
This is almost a blessing in disguise for the researchers working on different domains and …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …