Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
IOTA MAM and Internet of Underwater Things systems
The main problem of the IoT control devices and sensor is the lack of secure direct communication with thefinal trust point and different types of corruption and spoofing can occur. This introduces a great opportunity for data tampering and cyber-attack in addition no one can trust the sensor data in the first communication step.
No one guarantees that a right sensor sends out the right data due to no authentication and no truthfulness of sensors that are connected with a trusted point. The middle point is the first trusted point but no one can guarantee correctness and truthfulness in the data before this point. The aim of this talk is to reach out a new way to directly connect an embedded devices system, in this case, an underwater things system directly with a DL endpoint. The final purpose is to avoid an intermediary gateway step and port down the entire client system directly on embedded IoT devices, this will allow the device to directly communicate with blockchain with no additional middle step.
The entire project covers the needs to reach a secure and authenticate communication directly from the sensor node and in this way guarantee the CIA properties from the bottom.
We have therefore developed a solution that exploits the advantages of the IOTA MAM protocol and the advantages offered by the DL technology offered by IOTA to set up a protocol that allows direct communication between IOTA Tangle and low-level devices.
The solution is based on IOTA technology and IOTA environment and uses MAM protocol for message exchange on tangle. This protocol allows to sign and encrypt the message and thanks to the solidity of IOTA tangle is easy to reach the continuous availability and accessible to the service.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
This report describes how things get connected via internet.It also describes how actually iot architecture looks like.The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
IOTA MAM and Internet of Underwater Things systems
The main problem of the IoT control devices and sensor is the lack of secure direct communication with thefinal trust point and different types of corruption and spoofing can occur. This introduces a great opportunity for data tampering and cyber-attack in addition no one can trust the sensor data in the first communication step.
No one guarantees that a right sensor sends out the right data due to no authentication and no truthfulness of sensors that are connected with a trusted point. The middle point is the first trusted point but no one can guarantee correctness and truthfulness in the data before this point. The aim of this talk is to reach out a new way to directly connect an embedded devices system, in this case, an underwater things system directly with a DL endpoint. The final purpose is to avoid an intermediary gateway step and port down the entire client system directly on embedded IoT devices, this will allow the device to directly communicate with blockchain with no additional middle step.
The entire project covers the needs to reach a secure and authenticate communication directly from the sensor node and in this way guarantee the CIA properties from the bottom.
We have therefore developed a solution that exploits the advantages of the IOTA MAM protocol and the advantages offered by the DL technology offered by IOTA to set up a protocol that allows direct communication between IOTA Tangle and low-level devices.
The solution is based on IOTA technology and IOTA environment and uses MAM protocol for message exchange on tangle. This protocol allows to sign and encrypt the message and thanks to the solidity of IOTA tangle is easy to reach the continuous availability and accessible to the service.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
This report describes how things get connected via internet.It also describes how actually iot architecture looks like.The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
A secure sharing control framework supporting elastic mobile cloud computing IJECEIAES
In elastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regards security risks as a cost of EMCC and ensures that the use of EMCC is. Finally, it is pointed out that the difficulty of risk management lies in risk quantification and sensitive module labeling. In this regard, risk quantification algorithms are designed, an automatic annotation tool for sensitive modules of Android programs is implemented, and the accuracy of the automatic annotation is demonstrated through experiments.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 6, December 2021, pp. 5081~5088
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i6.pp5081-5088 5081
Journal homepage: http://ijece.iaescore.com
Fog computing security and privacy issues, open challenges, and
blockchain solution: An overview
Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Ashraf Jaradat
Management Information Systems Department, College of Business Administration,
American University of the Middle East, Kuwait
Article Info ABSTRACT
Article history:
Received Mar 27, 2020
Revised May 5, 2021
Accepted May 18, 2021
Due to the expansion growth of the IoT devices, Fog computing was
proposed to enhance the low latency IoT applications and meet the
distribution nature of these devices. However, Fog computing was criticized
for several privacy and security vulnerabilities. This paper aims to identify
and discuss the security challenges for Fog computing. It also discusses
blockchain technology as a complementary mechanism associated with Fog
computing to mitigate the impact of these issues. The findings of this paper
reveal that blockchain can meet the privacy and security requirements of fog
computing; however, there are several limitations of blockchain that should
be further investigated in the context of Fog computing.
Keywords:
Application
Benefit
Fog computing
IoT
Security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ahmad Al-Ahmad
Management Information Systems Department College of Business Administration
American University of the Middle East, Kuwait
Email: ahmad.alahmad@aum.edu.kw
1. INTRODUCTION
IoT is a technology that is used in the interconnectivity of several types of physical devices with
embedded software such as PDAs, smartphones, smart vehicles, smart meters, and sensors. On the other
hand, Cloud computing is a technology that provides on-demand computing resources [1]. IoT devices
depend on the Cloud to improve flexibility, system stability, fault tolerance, cost-effective, innovative
business models, and better communications [2], [3]. Due to the expansion growth of the number of IoT
devices [4], the Cloud has to deal with a massive amount of data that include confidential and sensitive data.
Therefore, it requires security mechanisms to protect confidentiality, privacy, data integrity and to eliminate
security threats. Likewise, Cloud computing architecture when used with IoT devices may suffer from a
critical challenge related to delay-sensitive applications such as online games and emergency services which
might be ruined when unexpected delays occur. Consequently, fog computing (FC) has been proposed to
overcome these drawbacks of Cloud computing traditional drawbacks [5], [6].
FC is “an end-to-end horizontal architecture that distributes computing, storage, control, and
networking functions closer to users along the Cloud-to-thing continuum” [7]. FC can help to address several
security concerns related to Cloud and IoT generated data security. FC facilitates the on-site data storage and
analysis of time-sensitive heterogeneous data by reducing the amount of confidential data stored and
transmitted to the Cloud. Moreover, FC can help to mitigate latency issues, unavailability of location
awareness, mobility support, and bandwidth obstacles [8], [9]. Approximately, 45% of IoT-generated data
will use FC that can be installed within the close range of IoT sensors and devices for local processing and
data storage [10], [11].
Despite the above-mentioned benefits, FC compromises several issues. These issues due to the
distributed and homogeneous nature of FC, its extension of the Cloud which inherits several issues from the
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5081 - 5088
5082
Cloud, and its proximity to IoT devices [12]. The most challenging issues that have been reported in the
literature were privacy and security issues. Fortunately, many studies have recently reported that security and
privacy issues in FC can be mitigated by adopting the blockchain (BC) technology [13]-[16]. BC has
originally used in Bitcoin; however, recently many applications have adopted BC to enhance privacy and
security online transactions [17]. Accordingly, this research is conducted to improve the general
understanding of the FC security challenges for future digital infrastructure and how BC can mitigate the
effect of these challenges. Hence, this paper aims to answer the following research questions:
RQ1 : What are the security and privacy issues that face FC?
RQ2 : How BC can mitigate the impact of FC security and privacy issues?
The main contributions of this study are: i) identify and analyze the security challenges along with
their existing solutions and respective limitations, ii) study the complementary relationship between BC and
FC by exploring BC-based solutions to cater a Fog-enabled IoT’s privacy and security concerns. The rest of
this paper is organized as follows. Section 2 presents the background of FC. Section 3 discusses the state-of-
the-art privacy and security challenges due to the use of FC. Section 4 discusses how BC can mitigate the
open challenges of security and privacy in FC. Section 5 concludes this paper.
2. FOG COMPUTING BACKGROUND
Figure 1 provides a holistic view of the FC-IoT architecture. In this architecture, each IoT device
can be connected to one Fog node through wired or wireless access media such as ZigBee and WiFi. Fog
nodes communicate with each other through wireless or wired media as well. Virtualization technologies
such as software-defined network and network functions virtualization are used to achieve network
virtualization and traffic engineering [6], [18]. In this architecture, three layers can be identified; IoT device layer (i.e.,
end-user’s devices such as smartphone, smartwatches, and so on), Fog layer (i.e., routers, switches, computers, and
so on), and Cloud layer (i.e., the central storage and control devices and systems) [19]-[21].
A typical BC and smart contract implementation also illustrated in Figure 1. The data sent from IoT
devices to the Fog node for data aggregation and further analysis [22]. Fog nodes enforce predefined security
policies to manage connected IoT devices and services and also play an intermediate role of interaction
between the Cloud and the public BC which enable indexing of authentication for data query [23]. The
diagram explains real-time indexing, BC enabled authentication and secure data transfer. The data transferred
is encrypted using an encryption algorithm such as AES and RSA which provides a short key establishment
time and protects against network attacks [23]. In short, BC enables an indexing authentication approach that
represents a scalable, decentralized, and protected data sharing in FC.
Figure 1. BC-fog architecture
3. SECURITY AND PRIVACY ISSUES OF FOG COMPUTING
Due to the nature of the FC of distribution, heterogeneity, closeness to IoT devices, and extension of
Cloud computing many security and privacy issues were reported in the literature. This makes FC vulnerable
to many attacks such as Man-in-the-Middle, Denial-of-Service, Rogue Fog Node, and Sybil attacks [24].
Some of these challenges have been provided some solutions as shown in Table 1.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Fog computing security and privacy issues, open challenges, and blockchain … (Yehia Ibrahim Alzoubi)
5083
Table 1. Summary of recommended solutions for some of security and privacy issues of FC
Issue Recommendation
Access
control
Several solutions were provided in the literature such as attribute-based encryption (ABE) access control [25], fine-grained
access control [26], policy-driven management framework [27], leakage-resilient functional encryption schemes, device
management, and key management [28], [29].
Packet
Forwarding
It should be ensured that the features of the sent packet are maintained to guarantee the privacy of the packet sent
between two Fog nodes or between Fog and IoT devices. End-to-end connectivity requires the cooperation of other
nodes to enable message delivery and privacy-preserving packet forwarding should be used [28].
Virtualization A lack of security countermeasures may result in enabling VM to manipulate the services of the Fog or taking
control of the underlying operating system and hardware. Several solutions have been proposed such as
implementing isolation policies, network abstraction, VM monitoring, multi-factor authentication, installation of
detection systems at host and network, user-based permissions model, and hardening the hypervisor [25], [30], [31].
Fault
Tolerance
Attackers may take control over or disable Fog nodes or the entire structure, due to misconfigurations, out-of-date
software, weaknesses, and other faults. Therefore, participating in various policies and mechanisms as well as the
deployment of a proactive fault-tolerance method is vital [25], [32].
Data
Management
Data identification, aggregation, search, analysis, sharing, and distribution represent another issue for FC. Several
mechanisms were proposed to ensure data integrity such as Trusted Platform Module (TPM), homomorphic
encryption, one-way entrance permutation, key distribution, searchable, symmetric, and asymmetric encryption, data
encryption schema used for single keyword search, and key-aggregate encryptions [6], [28], [33].
Light-weight
Protocol
Design
Lightweight protocols should support real-time service performance by reducing the communication between the
IoT devices and Fog nodes. Various lightweight cryptographic schemes and techniques were anticipated to address
this issue including elliptic curve cryptosystem [28], has functions, masking techniques, and stream chippers for
secure end-to-end communication [6].
Malicious
Fog Node
In order to avoid this issue, it was suggested to deploy fake node detection systems and trust-based routing
mechanisms [6], creating and deleting virtual machine instances in a dynamic way complicates the process of
maintaining a blacklist of rogue nodes [34].
The security and privacy solutions of FC proposed by literature oversimplified the real ecosystem
nature of FC assuming FC as a single Cloud provider. FC compromises numerous cooperating service
providers, services, and infrastructures related to diverse trust domains [35]. Therefore, state-of-the-art
solutions are essential to encounter the security and privacy requirements for the FC. These solutions should
ease the collaboration between different components in this complex environment. Table 2 summarizes the
open questions and research challenges in this context.
Table 2. Open research challenges of security and privacy issues of FC
Issue Open Research Challenges
Authenticatio
n
Since FC offers different services to a huge number of IoT devices, authentication should be applied at different
levels during communication between Fog nodes and IoT devices [25]. In spite of the new authentication techniques that
have been proposed such as identity, Decoy, anonymous, and cooperative, single-domain, cross-domain, and handover
authentication [28], authentication represents one of the major worries in FC [4].
Detection
Systems
Although several detection systems were proposed such as signature-based and neural network-based, fuzzy logic,
lightweight countermeasure utilizing bloom filters, and distributed detection systems [23]-[25], there is a vital need
for new systems that can integrate the different detection components which are distributed in the Fog network [24].
Trust
Management
Trust, in FC, must be enabled by the Fog nodes. Moreover, Fog nodes that are delegated with data and processing
requests by the IoT devices are mandatory to create consistent communications with the Fog nodes. This two-way
challenge makes the creation of the trust a challenging task, despite several trust models that have been proposed
such as trusted execution environment (TEE), region-based trust-aware (RBTA), and trusted distributed platform
over the edge devices [25], [28].
Join/Leave
Node
There is a vital need to create an authentication structure whenever an IoT device leaves one Fog node and join
another or when a Fog node leaves the Fog layer. This structure should be of low complexity. Moreover, the system
should be able to identify the misbehaved IoT device [24], [36].
Forensics There is a big number of log records FC. This hardens the acquirement of the log data from Fog nodes [37]. Some
proposed solutions were by keeping tracking of changes in data location among regions using mobility service (MS)
and location register database (LRD) [25]. However, Fog forensics are questioned to some boundaries like the need
for international regulation and application-level logging [38]. Furthermore, more resources and computational
processing power to store trusted evidence in a distributed ecosystem with multiple trust domains [21].
Privacy
Preservation
Comparing to Cloud computing, FC is more vulnerable than Cloud computing in terms of privacy risks (i.e., data,
identity, location, and usage privacy). The vulnerability is observed due to the closeness of Fog nodes to the
customer, which allows gathering more sensitive information from them and computing the customer data is
outsourced to the Fog node, which might collect data from IoT services and relate them to the real identities of the
clients [39]. Several solutions have been suggested in the literature to preserve the privacy of data in Fog
environment like masking technique or lightweight encryption algorithms, Home-Area Network (HAN), identity
obstruction techniques, differential and homomorphic techniques, identity-based and attribute-based encryptions,
and proxy re-encryption [1], [40].
Several recommendations were provided in the literature to enhance security and privacy in the Fog
environment [14], [17], [26], [38], [41]-[49]. i) Deliver the elementary services of access control,
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5081 - 5088
5084
authentication, and authorization of all components involved in the Fog environment in order to establish
secure communication channels, ii) Monitor the status of infrastructure using situational awareness
mechanisms, iii) FC should provide privacy for both IoT devices and the service providers as these providers
are part of the FC, iv) FC must provide digital evidence management (Forensics), v) BC technology can
provide a high privacy and security for FC since it permits transparent and provable evidence, increases trust,
and enhances data sharing decisions. Recently, many authors argued that BC can overcome many of the
above privacy and security challenges. Their findings will be included in the following discussion.
4. BLOCKCHAIN SOLUTION
This section discusses how BC may help to mitigate the open research challenges of security and
privacy issues of FC. Initially, BC technology originated in 2008 from a paper by Nakamoto [50] on bitcoin.
BC is a chain of blocks that store a committed transaction by using a public ledger. It has emerged as a
disruptive force, general-purpose technology for industries to support information exchange and transactions that
require authentication and trust [51]. BC offers a decentralized shared database with transparent and immutable
transaction records. It enables peer-to-peer transfer of digital assets without any intermediaries [6].
Some key characteristics, such as decentralization, persistency, anonymity, and auditability, are
associated with BC technology [52]. BC persistency feature assures the ability to measure trust and offers
producers and consumers the ability to prove their data are authentic. BC anonymity can help to prevent the
producer's and consumer's identity [24]. BC decentralization nature of synchronized online registries can
detect and prevent malicious actions [24]. Furthermore, BC compromises several core technologies, such as
digital signatures, cryptographic hash, and distributed consensus algorithms that can significantly enhance
security and privacy concerns [51].
Smart contracts in BC is an effective rules to authenticate the IoT devices which protect data privacy [51].
Furthermore, they are useful in detecting and preventing malicious actions. Providing unique guide and
symmetric key pair to each IoT device connected to the BC network is another motivation to implement BC
technology as it simplifies the utilization of security protocols [23]. BC provides secure communication
among IoT devices and enables the verification of the device’s identity and ensures verified cryptography of
the transactions [53].
Due to the above features, BC can be a useful technology to cater to the above-mentioned security
and privacy issues in FC-IoT systems. It is in an easy, efficient, trustworthy, and secured manner [54]. BC
ensures security, authentication, and integrity of transmitted data by IoT devices to be cryptographically proofed
and assigned by the authentic sender. BC provides secure tracking of IoT device transactions easier [55].
As FC possesses a distributed computing environment, BC technology can offer good grounds for
FC-enabled IoT systems to build and manage decentralized trust and security solutions [24]. BC can detect
and isolate the malfunctioning node to protect the whole system from any security breach [6]. This provides
self-healing capability to the Fog-enabled IoT systems. The security system equipped with BC-based security
satisfies most of the requirements of Fog-enabled IoT systems by enhancing independent operation between
all the connected nodes [55]. Table 3 (in appendix) summarizes how BC can enhance security and privacy in
FC based on the latest literature.
5. CONCLUSION AND FUTURE DIRECTIONS
IoT devices are vulnerable to different security attacks due to the lack in hardware and software
security designs. This paper discusses potential security and privacy challenges observed from Fog-enabled
IoT literatures. It also discussed BC as an emerging security and privacy solution for Fog-enabled IoT
domain. This paper, provides an overview of the open challenges of FC security and privacy issues. It also
provides an overview of how BC can mitigate most of these challenges. The BC characteristics such as
decentralization can provide a mechanism that enhance security, authentication, and integrity of data sent by
IoT devices. It also ensures anonymity of the IoT devices.
Despite the above-mentioned characteristics and benefits of BC if used in FC, not all Fog
applications are supported by all BC consensus mechanisms. For instance, proof of work (PoW) cannot be
hosted on Fog devices as it demands enormous resources such as power and computing to execute
transactions. Moreover, bitcoin BC poses response time latency in transaction validation process which make
it not the best choice for real-time applications. In addition, due to the tremendous rate of growth in the
number of IoT devices, BC in FC may face an issue in scalability. Therefore, more research is yet to be
accompanied in this era. The findings of this paper guide academics and industries to investigate new
answers to the open questions of the FC security and privacy issues.
5. Int J Elec & Comp Eng ISSN: 2088-8708
Fog computing security and privacy issues, open challenges, and blockchain … (Yehia Ibrahim Alzoubi)
5085
APPENDIX
Table 3. Open research challenges of security and privacy issues of FC
Domain BC Advantages
Security Reduce security threats: BC can be used to create secured virtual zones that help in mitigating the effect and
protecting the system against several threat attacks, such as cache poisoning, ARP spoofing, and denial of service
attacks [56].
Well-structured: BC is based on a clear well-defined structure that takes into consideration all security aspects such
as authentication, authorization, and data protection [57].
Enhance security: BC encrypt the data exchanged within the architecture, which in return enhances the security of the
system [58].
Enhance IoT security: BC enrich the security in the IoT devices by overcoming the limitation of the devices when
applying security policies [59].
Prevent from a single point of failure: Being decentralized made the BC architecture not having such a weak point as
a single point of failure [56].
Preservation Enhance Data integrity: BC protects efficiently the data from unintended and incomplete changes due to the solid
trust verification process for any transaction types [60].
Protect users and device identity: BC protects the identity of the IoT devices by supporting anonymous
communication methods [60]
Enhance independency: BC reduce the need to have a third-party to verify entities or processes which minimizes the
sharing of data with external bodies [58].
Enhance confidentiality: BC architecture enable the user to control his data in term of locations to save the entities to
participate in the trust verification process [61].
Enhance authentication: BC uses immune verification and validation processes that make identity theft extremely
difficult if not impossible [62].
Performance Enhance performance: BC uses Software-Defined Networks (SDN), which may enhance certain functions in the
applied architecture, such as authentication and logging [59].
Reduce delay: Distribution of processes in the BC will reduce the delay in delivering the required response from the
system [63].
Reduce Overhead: Distribution of processes in the BC will reduce the overhead that were on a single machine [64].
Scalability Scalability: BC doesn’t have any restriction on the type of devices nor the process scenario. For instance, BC can be
implemented using any IoT device, any Fog node structure, and any decentralized process [63].
Flexibility Improve Flexibility: BC has different implementation models that go beyond the classical implementation. This will
help BC in meeting various needs and requirements. For instance, security requirements can be fulfilled by using
centralized and decentralized components in the architecture, for example, the use of a centralized ledger, instead of a
centralized ledger, while using a distributed trust can help to solve satisfies certain security requests [53].
Efficiency Enhance geographical data use: BC uses the geographical data to prove and verify the process and devices while
keeping the geographical data protected [64].
Support concurrency: BC enables multiple processes to be executed at the same time, which in return will enhance
the efficiency, power usage and reduce the resources needed [65].
Energy
saving
Save energy: BC enhances the power usage efficiency as it distributes the tasks and reduces the overhead on the IoT
devices [59].
Auditability Enhance auditability: BC processes are transparent and logged in all the participants of the architecture [6].
REFERENCES
[1] P. Prakash, K. Darshaun, P. Yaazhlene, M. V. Ganesh, and B. Vasudha, "Fog Computing: Issues, Challenges and
Future Directions," International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 6,
pp. 3669-3673, 2017, doi: 10.11591/ijece.v7i6.pp3669-3673.
[2] A. Yassine, S. Singh, M. S. Hossain, and G. Muhammad, "IoT big data analytics for smart homes with fog and
cloud computing," Future Generation Computer Systems, vol. 91, pp. 563-573, 2019,
doi: 10.1016/j.future.2018.08.040.
[3] R. Iqbal, T. A. Butt, M. Afzaal, and K. Salah, "Trust management in social Internet of vehicles: Factors, challenges,
blockchain, and fog solutions," International Journal of Distributed Sensor Networks, vol. 15, no. 1, 2018,
doi: 10.1177/1550147719825820.
[4] Y. I. Alzoubi, A. Al-Ahmad, A. Jaradat, and V. H. Osmanaj, "Fog Computing Architecture, Benefits, Security, and
Privacy, for the Internet of Thing Applications: An Overview," Journal of Theoretical and Applied Information
Technology, vol. 99, no. 2, pp. 436-451, 2021, doi: 10.1002/spy2.145.
[5] Z. Ashi, M. Al-Fawa'reh, and M. Al-Fayoumi, "Fog Computing: Security Challenges and Countermeasures,"
International Journal of Computer Applications, vol. 175, no. 15, pp. 30-36, 2020, doi: 10.5120/ijca2020920648.
[6] N. Tariq et al., "The security of big data in fog-enabled IoT applications including blockchain: A survey," Sensors,
vol. 19, no. 8, 2019, Art. no. 1788, doi: 10.3390/s19081788.
[7] M. Chiang, S. Ha, I. Chih-Lin, F. Risso, and T. Zhang, "Clarifying fog computing and networking: 10 questions and
answers," IEEE Communications Magazine, vol. 55, no. 4, pp. 18-20, 2017, doi: 10.1109/MCOM.2017.7901470.
[8] C. Rupa, R. Patan, F. Al-Turjman, and L. Mostarda, "Enhancing the Access Privacy of IDaaS System Using SAML
Protocol in Fog Computing," IEEE Access, vol. 8, pp. 168793-168801, 2020, doi: 10.1109/ACCESS.2020.3022957.
[9] P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "Security and privacy preservation scheme of face
identification and resolution framework using fog computing in internet of things," IEEE Internet of Things
Journal, vol. 4, no. 5, pp. 1143-1155, 2017, doi: 10.1109/JIOT.2017.2659783.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5081 - 5088
5086
[10] X. Shen, L. Zhu, C. Xu, K. Sharif, and R. Lu, "A privacy-preserving data aggregation scheme for dynamic groups
in fog computing," Information Sciences, vol. 514, pp. 118-130, 2020, doi: 10.1016/j.ins.2019.12.007.
[11] R. Neware and U. Shrawankar, "Fog Computing Architecture, Applications and Security Issues," International
Journal of Fog Computing (IJFC), vol. 3, no. 1, pp. 75-105, 2020, doi: 10.20944/preprints201903.0145.v1.
[12] Z. Chen, H. Cui, E. Wu, Y. Li, and Y. Xi, "Secure Distributed Data Management for Fog Computing in Large-
Scale IoT Application: A Blockchain-Based Solution," IEEE International Conference on Communications
Workshops (ICC Workshops), 2020, pp. 1-6, doi: 10.1109/ICCWorkshops49005.2020.9145381.
[13] H. Elazhary, "Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge
emerging computing paradigms: Disambiguation and research directions," Journal of network and computer
applications, vol. 128, pp. 105-140, 2019, doi: 10.1016/j.jnca.2018.10.021.
[14] S. Nadeem, M. Rizwan, F. Ahmad, and J. Manzoor, "Securing cognitive radio vehicular ad hoc network with fog
node based distributed blockchain cloud architecture," International Journal of Advanced Computer Science and
Applications, vol. 10, no. 1, pp. 288-295, 2019, doi: 10.14569/IJACSA.2019.0100138.
[15] A. S. Al-Ahmad, S. A. Aljunid, and N. K. Ismail, "Mobile cloud computing applications penetration testing model
design," International Journal of Information and Computer Security, vol. 13, no. 2, pp. 210-226, 2020,
doi: 10.1504/IJICS.2020.108849.
[16] A. S. Al-Ahmad and H. Kahtan, "Cloud Computing Review: Features And Issues," 2018 International Conference
on Smart Computing and Electronic Enterprise (ICSCEE), 2018, pp. 1-5, doi: 10.1109/ICSCEE.2018.8538387.
[17] B. K. Mohanta, D. Jena, S. S. Panda, and S. Sobhanayak, "Blockchain technology: A survey on applications and
security privacy challenges," Internet of Things, vol. 8, 2019, Art. no. 100107, doi: 10.1016/j.iot.2019.100107.
[18] P. Habibi, M. Farhoudi, S. Kazemian, S. Khorsandi, and A. Leon-Garcia, "Fog Computing: A Comprehensive
Architectural Survey," IEEE Access, vol. 8, pp. 69105-69133, 2020, doi: 10.1109/ACCESS.2020.2983253.
[19] C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, "A comprehensive survey
on fog computing: State-of-the-art and research challenges," IEEE Communications Surveys & Tutorials, vol. 20,
no. 1, pp. 416-464, 2017, doi: 10.1109/COMST.2017.2771153.
[20] F. Haouari, R. Faraj, and J. M. AlJa'am, "Fog Computing Potentials, Applications, and Challenges," 2018 International
Conference on Computer and Applications (ICCA), 2018, pp. 399-406, doi: 10.1109/COMAPP.2018.8460182.
[21] Y. I. Alzoubi, V. H. Osmanaj, A. Jaradat, and A. Al-Ahmad, "Fog computing security andprivacy for the Internet of
Thing applications: State-of-the-art," Security and Privacy, vol. 4, no. 2, pp. 1-26, 2020, Art. no. e145,
doi: 10.1002/spy2.145.
[22] A. A.-N. Patwary, A. Fu, S. K. Battula, R. K. Naha, S. Garg, and A. Mahanti, "FogAuthChain: A secure location-
based authentication scheme in fog computing environments using Blockchain," Computer Communications,
vol. 162, pp. 212-224, 2020, doi: 10.1016/j.comcom.2020.08.021.
[23] P. Singh, A. Nayyar, A. Kaur, and U. Ghosh, "Blockchain and Fog Based Architecture for Internet of Everything in
Smart Cities," Future Internet, vol. 12, no 4, 2020, Art. no. 61, doi: /10.3390/fi12040061.
[24] N. S. Khan and M. A. Chishti, "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree
Solutions: A Review," Scalable Computing: Practice and Experience, vol. 21, no. 3, pp. 515-542, 2020,
DOI:10.12694/scpe.v21i3.1782
[25] R. Roman et al., "A survey and analysis of security threats and challenges," Future Generation Computer Systems,
vol. 78, pp. 680-698, 2018, doi: 10.1016/j.future.2016.11.009.
[26] A. Muthanna et al., "Secure and reliable IoT networks using fog computing with software-defined networking and
blockchain," Journal of Sensor and Actuator Networks, vol. 8, no. 1, 2019, Art. no. 15, doi: /10.3390/jsan8010015.
[27] R. Guo, C. Zhuang, H. Shi, Y. Zhang, and D. Zheng, "A lightweight verifiable outsourced decryption of attribute-
based encryption scheme for blockchain-enabled wireless body area network in fog computing," International
Journal of Distributed Sensor Networks, vol. 16, 2020, doi: 10.1177/1550147720906796.
[28] J. Ni, K. Zhang, X. Lin, and X. S. Shen, "Securing fog computing for internet of things applications: Challenges
and solutions," IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2017,
doi: 10.1109/COMST.2017.2762345.
[29] A. Yousefpour et al., "All one needs to know about fog computing and related edge computing paradigms: A
complete survey," Journal of Systems Architecture, vol. 98, pp. 289-330, 2019, doi: 10.1016/j.sysarc.2019.02.009.
[30] B. Z. Abbasi and M. A. Shah, "Fog computing: Security issues, solutions and robust practices," 2017 23rd
International Conference on Automation and Computing (ICAC), 2017, pp. 1-6,
doi: 10.23919/IConAC.2017.8082079.
[31] S. Khan, S. Parkinson, and Y. Qin, "Fog computing security: a review of current applications and security
solutions," Journal of Cloud Computing, vol. 6, 2017, Art. no. 90, doi: 10.1186/s13677-017-0090-3.
[32] R. K. Naha et al., "Fog Computing: Survey of trends, architectures, requirements, and research directions," IEEE
access, vol. 6, pp. 47980-48009, 2018, doi: 10.1109/ACCESS.2018.2866491.
[33] Y. Guan, J. Shao, G. Wei, and M. Xie, "Data security and privacy in fog computing," IEEE Network, vol. 32,
pp. 106-111, 2018, doi: 10.1109/MNET.2018.1700250.
[34] H. Tian, F. Nan, C.-C. Chang, Y. Huang, J. Lu, and Y. Du, "Privacy-preserving public auditing for secure data
storage in fog-to-cloud computing," Journal of Network and Computer Applications, vol. 127, pp. 59-69, 2019,
doi: 10.1016/j.jnca.2018.12.004.
[35] M. Mukherjee, M. A. Ferrag, L. Maglaras, A. Derhab, and M. Aazam, "Security and privacy issues and solutions
for fog," Fog and Fogonomics: Challenges and Practices of Fog Computing, Communication, Networking,
Strategy, and Economics, pp. 353-374, 2020.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Fog computing security and privacy issues, open challenges, and blockchain … (Yehia Ibrahim Alzoubi)
5087
[36] A. K. Alhwaitat, S. Manaseer, and M. Alsyyed, "A survey of digital forensic methods under advanced persistent
threat in fog computing environment," Journal of Theoretical and Applied Information Technology, vol. 97, no. 18,
pp. 4934-4954, 2019.
[37] Y. Wang, T. Uehara, and R. Sasaki, "Fog computing: Issues and challenges in security and forensics," 2015 IEEE 39th
Annual Computer Software and Applications Conference, 2015, pp. 53-59, doi: 10.1109/COMPSAC.2015.173.
[38] M. Mukherjee et al., "Security and privacy in fog computing: Challenges," IEEE Access, vol. 5, pp. 19293-19304,
2017, doi: 10.1109/ACCESS.2017.2749422.
[39] N. Abubaker, L. Dervishi, and E. Ayday, "Privacy-preserving fog computing paradigm," 2017 IEEE Conference on
Communications and Network Security (CNS), 2017, pp. 502-509, doi: 10.1109/CNS.2017.8228709.
[40] S. Yi, Z. Qin, and Q. Li, "Security and privacy issues of fog computing: A survey," International conference on
wireless algorithms, systems, and applications, 2015, pp. 685-695, doi: 10.1007/978-3-319-21837-3_67.
[41] R. Rios, R. Roman, J. A. Onieva, and J. Lopez, "From SMOG to Fog: a security perspective," 2017 Second International
Conference on Fog and Mobile Edge Computing (FMEC), 2017, pp. 56-61, doi: 10.1109/FMEC.2017.7946408.
[42] S. Tuli, R. Mahmud, S. Tuli, and R. Buyya, "Fogbus: A blockchain-based lightweight framework for edge and fog
computing," Journal of Systems and Software, vol. 154, pp. 22-36, 2019, doi: 10.1016/j.jss.2019.04.050.
[43] S.-H. Jang, J. Guejong, J. Jeong, and B. Sangmin, "Fog computing architecture based blockchain for industrial
IoT," International Conference on Computational Science, vol. 11538, 2019, pp. 593-606.
[44] H. L. Cech, M. Großmann, and U. R. Krieger, "A fog computing architecture to share sensor data by means of
blockchain functionality," 2019 IEEE International Conference on Fog Computing (ICFC), 2019, pp. 31-40,
doi: 10.1109/ICFC.2019.00013.
[45] K. Lei, M. Du, J. Huang, and T. Jin, "Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT
Services Computing," IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 252-262, 2020,
doi: 10.1109/TSC.2019.2949801.
[46] X. Huang, D. Ye, R. Yu, and L. Shu, "Securing parked vehicle assisted fog computing with blockchain and optimal
smart contract design," IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 2, pp. 426-441, 2020,
doi: 10.1109/JAS.2020.1003039.
[47] N. Islam, Y. Faheem, I. U. Din, M. Talha, M. Guizani, and M. Khalil, "A blockchain-based fog computing
framework for activity recognition as an application to e-Healthcare services," Future Generation Computer
Systems, vol. 100, pp. 569-578, 2019, doi: 10.1016/j.future.2019.05.059.
[48] J. Yang, Z. Lu, and J. Wu, "Smart-toy-edge-computing-oriented data exchange based on blockchain," Journal of
Systems Architecture, vol. 87, pp. 36-48, 2018, doi: 10.1016/j.sysarc.2018.05.001.
[49] A. Bonadio, F. Chiti, R. Fantacci, and V. Vespri, "An integrated framework for blockchain inspired fog
communications and computing in internet of vehicles," Journal of Ambient Intelligence and Humanized
Computing, vol. 11, pp. 755-762, 2020.
[50] S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf.
[51] O. Ali, A. Jaradat, AtikKulaki, and A. Abuhalimeh, "A comparative study: Blockchain technology utilization
benefits, challenges and functionalities," IEEE Access, vol. 9, pp. 12730-12749, 2021, doi:
10.1109/ACCESS.2021.3050241.
[52] H. Baniata and A. Kertesz, "A Survey on Blockchain-Fog Integration Approaches," IEEE Access, vol. 8,
pp. 102657-102668, 2020, doi: 10.1109/ACCESS.2020.2999213.
[53] Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, "Blockchain for the IoT and industrial IoT: A review," Internet of
Things, vol. 10, 2020, Art. no. 100081, doi: 10.1016/j.iot.2019.100081.
[54] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, "Blockchain technologies for
the internet of things: Research issues and challenges," IEEE Internet of Things Journal, vol. 6, no. 2,
pp. 2188-2204, 2018, doi: 10.1109/JIOT.2018.2882794.
[55] T. Alam, "Design a blockchain-based middleware layer in the Internet of Things Architecture," JOIV: International
Journal on Informatics Visualization, vol. 4, no. 1, pp. 28-31, 2020, doi: 10.30630/joiv.4.1.334.
[56] J. Sengupta, S. Ruj, and S. D. Bit, "A Comprehensive survey on attacks, security issues and blockchain solutions
for IoT and IIoT," Journal of Network and Computer Applications, vol. 149, 2020, Art. no. 102481,
doi: 10.1016/j.jnca.2019.102481.
[57] S. El Kafhali, C. Chahir, M. Hanini, and K. Salah, "Architecture to manage Internet of Things data using
blockchain and fog computing," Proceedings of the 4th International Conference on Big Data and Internet of
Things, 2019, pp. 1-8, Art. no. 32, doi: 10.1145/3372938.3372970.
[58] Y. Ma, Y. Sun, Y. Lei, N. Qin, and J. Lu, "A survey of blockchain technology on security, privacy, and trust in
crowdsourcing services," World Wide Web, vol. 23, no. 2, pp. 393-419, 2020, doi: 10.1007/s11280-019-00735-4.
[59] S. Misra, P. K. Deb, N. Pathak, and A. Mukherjee, "Blockchain-Enabled SDN for Securing Fog-Based Resource-
Constrained IoT," IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2020,
pp. 490-495, doi: 10.1109/INFOCOMWKSHPS50562.2020.9162706.
[60] M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, "Blockchain leveraged decentralized IoT eHealth
framework," Internet of Things, vol. 9, 2020, Art. no. 100159, doi: 10.1016/j.iot.2020.100159.
[61] Q. Kong, L. Su, and M. Ma, "Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With
Blockchain," IEEE Transactions on Intelligent Transportation Systems, 2020, pp. 1-10,
doi: 10.1109/TITS.2020.2983466.
[62] O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Kalam, and N. Idboufker, "Privacy-Aware and
Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing," Fifth International
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5081 - 5088
5088
Conference on Fog and Mobile Edge Computing (FMEC), 2020, pp. 347-352,
doi: 10.1109/FMEC49853.2020.9144845.
[63] L. Yang, M. Li, H. Zhang, H. Ji, M. Xiao, and X. Li, "Distributed Resource Management for Blockchain in Fog-
enabled IoT Networks," IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2330-2341, 2020,
doi: 10.1109/JIOT.2020.3028071.
[64] N. C. Luong, Y. Jiao, P. Wang, D. Niyato, D. I. Kim, and Z. Han, "A Machine-Learning-Based Auction for
Resource Trading in Fog Computing," IEEE Communications Magazine, vol. 58, no. 3, pp. 82-88, 2020,
doi: 10.1109/MCOM.001.1900136.
[65] M. Savi et al., "A blockchain-based brokerage platform for fog computing resource federation," 23rd Conference
on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2020, pp. 147-149,
doi: 10.1109/ICIN48450.2020.9059337.