logo

Annotated Bibliography on IoT

   

Added on  2023-01-23

6 Pages1249 Words29 Views
Running head: ANNOTATED BIBLIOGRAPHY 1
Annotated Bibliography on IoT
Name
Institutional Affiliation

ANNOTATED BIBLIOGRAPHY 2
Aazam, M., Zeadally, S., & Harras, K. A. (2018). Fog Computing Architecture, Evaluation, and
Future Research Directions. IEEE Communications Magazine, 56(5), 46-52.
doi:10.1109/mcom.2018.1700707
The authors note the significance of the Internet of Things in the recent years. Besides,
they posit that IoT has the capacity to broaden its scope and provision of services all attributed to
the paradigm of cloud computing. Furthermore, data collected at the IoT nodes can enhance
service delivery. The delivery of these services may incur some problems hence the need of
malware also known as fog.
Bazm, M. M., Lacoste, M., Südholt, M., & Menaud, J. M. (2017). Side Channels in the Cloud:
Isolation Challenges, Attacks, and Countermeasures.
The authors argue that software isolation which result from cloud computing are a result
of shared physical resources. Furthermore, the challenges of isolation can lead to varied
exploitation and leakages while obtaining important information. As a result, the authors came
up with side-channel attacks as a way to mitigate the said challenges. The channel focusses on
cache related attacks. Side-channel attacks constitute the greatest isolation violations with a
likelihood of implementing cryptographic algorithms. The article, therefore, provided an in depth
survey on side-channel attacks as well as their techniques of mitigation.
Chouhan, P., & Singh, R. (2016). Security attacks on cloud computing with possible
solution. International Journal of Advanced Research in Computer Science and Software
Engineering, 6(1). Retrieved from: www.ijarcsse.com

ANNOTATED BIBLIOGRAPHY 3
The article stresses on the need for appropriate security in the emerging technological world
providing a reliable, scalable, and flexible infrastructure for organizations. Cloud services are
provided by companies such as IBM, Google, and Amazon. These organizations provide
appropriate facilities for users thus ensuring security is provided.
Dar, A. R., & Ravindran, D. (2019). Fog Computing: An Efficient Platform for the Cloud-
resource Management. Journal of Emerging Technologies and Innovative Research, 6(2),
1-12. Retrieved from https://www.researchgate.net/publication/331035137
The article argue that cloud paradigm datacenters usually store heavy data which have an
impact on service costs as well as on energy consumption. Besides, these heavy data sizes
negatively impacts on the environment through excessive heating. Recent research such as the
CISCO’s fog-edge provide the new horizons of exploring distributed technologies. As a result,
Dar and Ranvindran ponder on fog computing as more convenient and saves on energy.
Nair, S., & Nair, H. (2016). A Study of DDoS Attack in Data Plane Network. International
Journal of Science Technology and Engineering, 3(5), 131-135. Retrieved from
hp://www.ijste.org/articles/IJSTEV3I5076.pdftt
In this article, the increase in vulnerability in the internet is attributed to the technology
which has been used for implementation of network routers. Nair note that ASIC routers were
not that exposed to attack compared to current routers. To curb this, the duo suggest the use of
benign protocol processing code which they believe will be significant in managing
vulnerability.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT Applications and Services - PDF
|8
|2649
|134

Security Issues in Cloud Computing- Document
|7
|1373
|77

Big Data Challenges in IoT & Cloud
|12
|5442
|109

IoT Threats to Database Security
|20
|1383
|296

Internet of things - Assignment
|13
|4549
|42

ITC571 - Emerging Technology and Innovations
|15
|3446
|200