logo

ITC571 - Emerging Technology and Innovations

   

Added on  2021-04-17

15 Pages3446 Words200 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: SECURITY PROTOCOLS IN FOG AND MOBILE EDGE COMPUTING
Full Name
Student ID
Subject ITC571 – Emerging Technology and Innovations
Assignment No Annotated Bibliography
Due Date 26-April-2018
Lecturer’s Name Malka N. Halgamuge
SECURITY PROTOCOLS IN FOG AND
MOBILE EDGE COMPUTING
Your Name
Your Email
School of Computing and Mathematics, Charles Sturt University, Melbourne, Victoria
ITC571 - Emerging Technology and Innovations_1

SECURITY PROTOCOLS IN FOG AND MOBILE EDGE COMPUTING
1
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Computer
Systems, 78, 680-698.fog et al.: A survey and analysis of security threats and
challenges. Future Generation C
INTRODUCTION
According to the authors, the report focuses on the security threats that mobile edge
computing faces and the challenges it faces. The positive impacts of mobile edge computing
has been stated in the report and some security measures have been discussed in the
recommendation section.
MATERIAL & METHODS
A detailed analysis have been conducted stating the need for security measures and
why they need to be enforced in the system to protect user data. In the report, a quantitative
survey has been conducted with over 12 organizations (which use mobile edge computing
systems) from three countries to gain a deeper insight into the security details of mobile edge
computing.
DISCUSSION
Though the authors have stressed a lot on the security threats and challenges of
mobile edge computing, it does not discuss the security measures or protocols in detail. The
report only states that the security protocols for mobile edge computing are being developed
by the Industrial Internet Consortium. Other than that, it proposes the organizations to
perform regular monitoring and check any anomalies that are security related. Besides that,
the survey report fails to define clearly the proposed security guidelines for the system.
ITC571 - Emerging Technology and Innovations_2

SECURITY PROTOCOLS IN FOG AND MOBILE EDGE COMPUTING
2
Dastjerdi, A. V., Gupta, H., Calheiros, R. N., Ghosh, S. K., & Buyya, R. (2016). Fog
computing: Principles, architectures, and applications. In Internet of Things (pp. 61-75).
INTRODUCTION
In this article, the authors have discussed the application and architectures of fog
computing in IoTs. The advantages and features of the desired applications of IoT such as
mission critical services and latency sensitive services have been discussed in details.
MATERIAL & METHODS
The underlying optimizations, privacy, fault tolerance and reliability of latency
reduction for the framework of resource allocations have been discussed in the following
article. The authors have also investigated an application scenario and conducted a security
check to formulate the resource optimization issues of the organization. The resulting
analysis helps to formulate a proper security protocol which will be followed by the
organization in the future for incorporating fog computing in the IoT devices.
DISCUSSION
The article fails to deliver proper security protocols that can be applied to
organizations in a general way. The security protocols have been selected only for the
organization itself and not for the other organizations that are also into the development of Iot
devices. Overally, the authors should have highlighted some general security
recommendations that could be adopted by other enterprises to facilitate their adoption of fog
computing.
ITC571 - Emerging Technology and Innovations_3

SECURITY PROTOCOLS IN FOG AND MOBILE EDGE COMPUTING
3
Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research
opportunities. IEEE Internet of Things Journal, 3(6), 854-864.
INTRODUCTION
An independent research has been conducted to understand the architecture of fog
computing. The networking, control, storage and computing systems of the architecture that
distributes the services to end users have been discussed in detail in the journal.
MATERIAL & METHODS
A wireline and mobile scenario has been taken as research subjects and how the
technology traverses across software and hardware. The journal also discusses details about
how it supports applications, IoT devices, 5g wireless networks, AI systems and the related
security measures needed to protect them from external threats. It also highlights the
challenges and opportunities of Fog in the context of IoT networking.
DISCUSSION
Although the authors have tried to explain the research opportunities of Fog in the
paper, it fails to provide appropriate recommendations for the Fog architecture. The research
methodology is not proper as well and the limitations of the research are unjustified. The
authors have stressed little on explaining the cross layer design of Fog. The author should
have highlighted the security issues first before explaining the paradigms and protocols.
ITC571 - Emerging Technology and Innovations_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enabling technologies for fog computing in New Zealand
|12
|11128
|14

Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication.
|5
|1758
|429

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
|24
|27021
|250

Annotated Bibliography on IoT
|6
|1249
|29

Emerging Technologies and Innovation - Assignment
|9
|2658
|63

Use of IoT in Healthcare
|11
|638
|34