Analysis of Fog Computing for IOT Security
Main Article Content
Abstract
Distributed processing efficiency provided by fog computing, IoT needs an autonomic security approach. It is because IoT devices are deployed in both the managed and the unmanaged environments. The devices in unmanaged environment are more vulnerable to cyber-attacks. The new IoT produces large amounts of data from millions of connected devices which needs low latency analytics. Fog computing will fulfill this need. Fog nodes provide an abstraction layer that masks the heterogeneity between devices and offers a consistent, virtualization programmable interface.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.