The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
Published 2019 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
Authors
Keywords
-
Journal
SENSORS
Volume 19, Issue 8, Pages 1788
Publisher
MDPI AG
Online
2019-04-15
DOI
10.3390/s19081788
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A secure fog-based platform for SCADA-based IoT critical infrastructure
- (2019) Thar Baker et al. SOFTWARE-PRACTICE & EXPERIENCE
- PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
- (2018) Sana Belguith et al. Computer Networks
- Internet of things security: A top-down survey
- (2018) Djamel Eddine Kouicem et al. Computer Networks
- Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
- (2018) Mohamed Tahar Hammi et al. COMPUTERS & SECURITY
- On blockchain and its integration with IoT. Challenges and opportunities
- (2018) Ana Reyna et al. Future Generation Computer Systems-The International Journal of eScience
- IoT security: Review, blockchain solutions, and open challenges
- (2018) Minhaj Ahmad Khan et al. Future Generation Computer Systems-The International Journal of eScience
- SecTrust -RPL: A secure trust-aware RPL routing protocol for Internet of Things
- (2018) David Airehrour et al. Future Generation Computer Systems-The International Journal of eScience
- Blockchain based hybrid network architecture for the smart city
- (2018) Pradip Kumar Sharma et al. Future Generation Computer Systems-The International Journal of eScience
- A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
- (2018) Ruhul Amin et al. Future Generation Computer Systems-The International Journal of eScience
- Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare
- (2018) Bahar Farahani et al. Future Generation Computer Systems-The International Journal of eScience
- Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
- (2018) Rodrigo Roman et al. Future Generation Computer Systems-The International Journal of eScience
- Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
- (2018) Jianbing Ni et al. IEEE Communications Surveys and Tutorials
- A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs
- (2018) Boyuan Sun et al. IEEE Access
- A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure
- (2018) Steven Walker-Roberts et al. IEEE Access
- BotDet: A System for Real Time Botnet Command and Control Traffic Detection
- (2018) Ibrahim Ghafir et al. IEEE Access
- Low Power Data Integrity in IoT Systems
- (2018) Muhammad Naveed Aman et al. IEEE Internet of Things Journal
- Analytical Model for Sybil Attack Phases in Internet of Things
- (2018) Alekha Kumar Mishra et al. IEEE Internet of Things Journal
- Everything You Wanted to Know about Smart Health Care: Evaluating the Different Technologies and Components of the Internet of Things for Better Health
- (2018) Prabha Sundaravadivel et al. IEEE Consumer Electronics Magazine
- A novel countermeasure technique for reactive jamming attack in internet of things
- (2018) Alaba Ayotunde Fadele et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
- (2018) Yang Lu et al. IEEE Internet of Things Journal
- Comparative Analysis of P2P Architectures for Energy Trading and Sharing
- (2017) Olamide Jogunola et al. Energies
- State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System
- (2017) Olamide Jogunola et al. Energies
- Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies
- (2017) Terence K.L. Hui et al. Future Generation Computer Systems-The International Journal of eScience
- A survey on the security of blockchain systems
- (2017) Xiaoqi Li et al. Future Generation Computer Systems-The International Journal of eScience
- Towards a secure service provisioning framework in a Smart city environment
- (2017) Zaheer Khan et al. Future Generation Computer Systems-The International Journal of eScience
- DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
- (2017) Pradip Kumar Sharma et al. IEEE COMMUNICATIONS MAGAZINE
- Security and Privacy for Cloud-Based IoT: Challenges
- (2017) Jun Zhou et al. IEEE COMMUNICATIONS MAGAZINE
- Architectural Imperatives for Fog Computing: Use Cases, Requirements, and Architectural Techniques for Fog-Enabled IoT Networks
- (2017) Charles C. Byers IEEE COMMUNICATIONS MAGAZINE
- A Survey of Standards for Machine-to-Machine and the Internet of Things
- (2017) Vangelis Gazis IEEE Communications Surveys and Tutorials
- Fog Computing for the Internet of Things: Security and Privacy Issues
- (2017) Arwa Alrawais et al. IEEE INTERNET COMPUTING
- An Integrated Architecture for Software Defined and Virtualized Radio Access Networks with Fog Computing
- (2017) Kai Liang et al. IEEE NETWORK
- Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things
- (2017) Zhetao Li et al. IEEE Transactions on Industrial Informatics
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
- (2017) Fan Wu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- IOTSim: A simulator for analysing IoT applications
- (2017) Xuezhi Zeng et al. JOURNAL OF SYSTEMS ARCHITECTURE
- Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing
- (2017) Abebe Abeshu Diro et al. MOBILE NETWORKS & APPLICATIONS
- A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service
- (2017) et al. SENSORS
- Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources
- (2017) Santosh Chandrasekhar et al. IEEE Transactions on Services Computing
- Can Blockchain Strengthen the Internet of Things?
- (2017) Nir Kshetri IT Professional
- A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
- (2017) Rongxing Lu et al. IEEE Access
- Security and Privacy in Fog Computing: Challenges
- (2017) Mithun Mukherjee et al. IEEE Access
- Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering
- (2017) Lingjuan Lyu et al. IEEE Internet of Things Journal
- Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things
- (2017) Pengfei Zhang et al. IEEE Internet of Things Journal
- Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks
- (2017) Cheng Li et al. IEEE Internet of Things Journal
- Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing
- (2017) Ziyi Su et al. IEEE Transactions on Big Data
- Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data
- (2016) Hyeong-Il Kim et al. DATA & KNOWLEDGE ENGINEERING
- Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey
- (2016) Nguyen Cong Luong et al. IEEE Communications Surveys and Tutorials
- Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
- (2016) Lichun Li et al. IEEE Transactions on Information Forensics and Security
- Social big data: Recent achievements and new challenges
- (2016) Gema Bello-Orgaz et al. Information Fusion
- Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control
- (2016) Xiao Yue et al. JOURNAL OF MEDICAL SYSTEMS
- Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
- (2016) Anam Sajid et al. IEEE Access
- Blockchains and Smart Contracts for the Internet of Things
- (2016) Konstantinos Christidis et al. IEEE Access
- Fog and IoT: An Overview of Research Opportunities
- (2016) Mung Chiang et al. IEEE Internet of Things Journal
- Internet of Things and Edge Cloud Computing Roadmap for Manufacturing
- (2016) Dimitrios Georgakopoulos et al. IEEE Cloud Computing
- Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
- (2015) Jorge Granjal et al. IEEE Communications Surveys and Tutorials
- Governance Challenges for the Internet of Things
- (2015) Virgilio A.F. Almeida et al. IEEE INTERNET COMPUTING
- Towards building a data-intensive index for big data computing – A case study of Remote Sensing data processing
- (2015) Yan Ma et al. INFORMATION SCIENCES
- ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks
- (2015) Pu Gong et al. Journal of Sensors
- Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
- (2015) Surya Nepal et al. IEEE Cloud Computing
- Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations
- (2014) Susan Landau IEEE SECURITY & PRIVACY
- Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
- (2014) Xiaohui Liang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
- (2014) Zhexiong Wei et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Defending Connected Vehicles Against Malware: Challenges and a Solution Framework
- (2014) Tao Zhang et al. IEEE Internet of Things Journal
- Trustworthiness Management in the Social Internet of Things
- (2013) Michele Nitti et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks
- (2013) Xiaodong Lin et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Securing m-healthcare social networks: challenges, countermeasures and future directions
- (2013) Jun Zhou et al. IEEE WIRELESS COMMUNICATIONS
- A Survey of Multi-Agent Trust Management Systems
- (2013) Han Yu et al. IEEE Access
- EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
- (2012) Rongxing Lu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Pi: A practical incentive protocol for delay tolerant networks
- (2010) Rongxing Lu et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
- (2009) Haojin Zhu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- TSVC: timed efficient and secure vehicular communications with privacy preserving
- (2009) Xiaodong Lin et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Intrusion Detection for Grid and Cloud Computing
- (2009) Kleber Vieira et al. IT Professional
- Public Key Broadcast Encryption Schemes With Shorter Transmissions
- (2008) Jong Hwan Park et al. IEEE TRANSACTIONS ON BROADCASTING
- Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
- (2008) Wolfgang Kröger RELIABILITY ENGINEERING & SYSTEM SAFETY
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started