Securing IoT through Fog Computing



in today's increasingly digital world cybersecurity is a top concern for businesses for government entities and for individuals as millions upon millions of devices become connected hackers find new vulnerabilities to exploit an increasingly sophisticated attacks make it far more difficult for systems to identify protect and react to these threats beyond stealing intelligence or disrupting business activity hackers now have more entry points that allow them to damage our physical world and pose serious safety risks to utilities factories transportation systems and other critical infrastructures but now fog computing an open architecture that is enabling innovation for IOT 5g and AI has emerged as a solution for mitigating such threats fogs distributed architecture safeguards connected systems from cloud to device creating an additional layer of system security in which compute control storage networking and communications work closer to the services and the data sources they serve and protect with fog security resides directly in the local context not as a remote function let's take a closer look fog nodes protect cloud based IOT and fog based services by performing a wide range of security functions on any number of interconnected devices even the smallest and most resource constrained this includes providing a trusted distributed platform and execution environment for applications and services managing and updating security credentials malware detection distributing timely software patches quickly and at scale and more fog ensures trustworthy communication by detecting and validating and reporting attacks fog can monitor the security status of nearby devices to quickly detect an isolate threats if a security breach is detected fog provides trusted foundations that enable real-time incident response directly and within the local context minimizing disruption of services and through its scalability modularity capacity and resource distribution fog allows for block chain deployments to low-cost IOT endpoints let's look at some examples multiple power generators are infected with malware root of trust capabilities based within a fog node allow operations managers to remotely isolate and shutter the generators that are infected keeping service disruption to a minimum a destruction of service attack is launched against a highly connected multi-purpose high-rise the building's fog architecture ensures that the cloud is the single point of reference outside the building greatly diminishing the attack surface during the attack fog notes continue to operate autonomously using only their local intelligence and locally stored data to manage permissions and data accessibility for building services ensuring that utilities elevators security systems fire alarms garage doors and other critical services remain active hackers seek to take over a smart factory by targeting a vulnerability in the assembly line equipment fog nodes protect ot domains by monitoring traffic from the internet into the distributed fog network and leveraging machine learning in the local context to detect a probable attack once detected fog notes act as gateways blocking traffic from the attackers and protecting the critical factory Network a European city utilizes a network of security cameras to comply with general data protection regulation standards that network can anonymize video data via local fog node if an incident does occur Public Safety officials can disable this functionality for real-time identification purposes at the open fog consortium security is a fundamental pillar of the open fog reference architecture our efforts are actively reducing cyber risk and turning fog based solutions from conceptual to actionable and now we invite you to follow to join this game-changing work we are the open file consortium you

2 Comments

  1. Daya Hadiya said:

    hello please suggest me phd research topic on iot fog computing.

    May 23, 2019
    Reply
  2. Amakan Agoni said:

    Best description of Security in fog computing.

    May 23, 2019
    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *