SlideShare a Scribd company logo
1 of 25
Download to read offline
SECURITY ISSUES OF IOT WITH FOG.
Achu Anna Antony
S1 M.Tech CSE
Roll No: 01
Guide: Mr.Bino Thomas
Assistant Professor, CSE
November 9, 2016
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
OUTLINE
Introduction
Existing System
Problem Statement
Proposed System
Conclusion
Future Works
References
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
INTRODUCTION
Cloud: Storing and accessing data and programs over the
Internet instead of computerโ€™s hard drive.
IoT : Everyday objects(IoT nodes) connected through
Internet, allowing them to send and receive data
IoT uses:
Internet : Infrastructure to interconnect IoT nodes
Cloud: Background supporting infrastructure
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
INTRODUCTION contd...
Huge network latency and Backend overhead occurs as data
to be processed increases in IoT cloud. So IoT uses,
Fog as a solution : ie.. intermediate computing bu๏ฌ€er between
IoT nodes and Cloud
Adoption of IoT fog can cause many security threats, which is
explored throughout
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
EXISTING SYSTEM
Title:- โ€Fog Computing and Its Role in the Internet of Thingsโ€
(F.Bonomi, R. Milito, J. Zhu, and S. Addepalli)
Proposed:
Fog Computing - Extension of cloud computing Features used
Features:
Highly virtualized platform
Limitations
Multi fog OS prevents from access of other OS. If there occur
any problem on Kernel mode, it does not prevent.
Figure: Fog with computing features
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
EXISTING SYSTEM contd...
Title:-โ€The Fog Computing Paradigm: Scenarios and Security
Issuesโ€ (I. Stojmenovic and W. Sheng)
Proposed:
Man in the middle attack- Fog devices get replaced by fake
ones.
Features:
Intrusion Detection method signature, behavioural or anomaly
based detection method
Limitations
Protection methods like encryption and decryption of data
consume large amount of battery on mobile devices.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
EXISTING SYSTEM contd...
Title:- Semantics-Aware Android Malware Classi๏ฌcation Using
Weighted Contextual API Dependency Graphs (M. Zhang, Y.
Duan, H. Yun, and Z.Zhao)
Proposed:
Android based malware detection
Features:
Uses Signature based approach for detection of malware
Graphs are generated from behaviour graphs and convert it to
signature and stores in database.
Limitations
Detection of malware from unknown or new malware family
will be hectic.
Figure: Android based malware to signature conversion[4]
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
FOG COMPUTING
Fog computing is an extension of cloud computing paradigm,
but is a more highly virtualized platform that provides
computation, storage, and networking services between end
IoT devices and back-end cloud servers.
Figure: The hierarchical fog computing architecture
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
ADVANTAGES AND APPLICATIONS OF FOG
Advantages
Greater business agility
Low latency
Geo distribution
Lower operating expense
Applications
Geographically distributed applications
Fast mobile applications
Large-scale distributed control systems
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
PROBLEM STATEMENT
As fog infrastructure is prone to many security threats, there
is a need for studying about them deeply so as the methods
discussed in the proposed systems is needed to combine which
is examined in the proposed system
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
RELEVANT SECURITY TECHNOLOGIES
Security technology for IoT network
When client wants to access cloud services, he must go
through authentication process to ensure con๏ฌdentiality and
security for IoT network.
Authorized users can access cloud with mobile devices.
Protocol is of two phases: Registration and Authentication.
Figure: Authentication as a service
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for fog node
In fog Computing, much of the information is gathered into
fog node.
If a wrong information is spread by exploiting vulnerability is a
big problem.
So need dynamic analysis techniques to monitor fog node in
real time
Typically, the performance overhead of dynamic analysis is
high.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for IoT node
When some IoT nodes are out of order or provide wrong
information, it can a๏ฌ€ect people.
Attacker has many chances to compromise various devices
with sensors.
The attacker is able to predict user behavior and abuse its
information.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
For IoT nodes, to be truly secure, an IoT node must also
obtain application layer security.
That means that the node itself, and not just the
communication channel (i.e. the pipe), should be
authenticated.
In addition to channel authentication, encryption and data
integrity should be established at the application layer to
protect the data ๏ฌ‚owing through the pipe.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING
Man- in- the middle Attack
In this attack, gateways serving as fog devices may be
compromised or replaced by fake ones.
Use a strong encryption between the client and the server and
never connect to open WiFi routers directly.
Encryption and decryption methods consume large amount of
battery on mobile device.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Intrusion Detection
Intrusion detection system analyzes and monitors
i) access control policy, ii) a log ๏ฌle, and iii)user log
information in order to detect intrusion behavior.
It can be run on network side in order to detect malicious
activity such as DoS, port scanning.
Intrusion detection techniques have been applied to mitigate
attacks such as i) insider attack, ii) ๏ฌ‚ooding attack, iii) port
scanning, iv) attacks on VM or hypervisor.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Fog node problem
In order to provide service to user, fog nodes process data
received from the IoT devices.
If the workloads is heavy, it is divided into several jobs and
processed by several fog nodes.
If some fog nodes are compounded by a malicious user, it is
di๏ฌƒcult to ensure the integrity of the data.
Before the computation begin, fog nodes must trust each
other.
An authentication protocol is required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Detection Technique
When some fog nodes are compromised, hybrid detection
technique is useful to detect malicious code in fog nodes.
It is combined with signature-based detection technique and
behavior-based detection technique.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Protection
Messages generated from IoT devices is sent to the nearest
fog nodes.
When distributed and processed data is merged, the integrity
of the data should be guaranteed.
Because of limited resources, it is di๏ฌƒcult to encrypt or
decrypt data on IoT device so light-weight encryption
algorithms or masking techniques are required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Management Issues
Fog nodes are geographically distributed, making it di๏ฌƒcult to
know data location.
The user wants to be provided with the same services in other
areas.
It is di๏ฌƒcult for user to know whether the node provides the
same service.
Some fog nodes by having duplicated ๏ฌles will cause a waste
of resources.
IoT will create enormous amounts of data there is a need for
distributed intelligence and so-called fast Big Data processing.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Every communication deployment of IoT is unique.
However, there are four basic stages that are common to just
about every IoT application. Those components are:
data collection,
data transmission,
data assessment, and
response to the available information.
Successful data management is therefore very important to
the success of IoT.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
CONCLUSION
IoT cloud with fog embedded system can overcome
congestion problem
network latency
Fog computing provides the improved quality of services to
the user by complementing shortages of IoT cloud.
IoT technology can be utilized in various ๏ฌelds in the future.
This presentation highlights the need to con๏ฌgure the secure
fog computing environment through security technologies
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
FUTURE WORKS
Future work should be done to develop a system for e๏ฌƒciently
collect and analyze various logs generated in fog computing
environment..
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
REFERENCES
[1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput
and Heekuck Oh,โ€On Security and Privacy Issues of Fog
Computing supported Internet of Things Environment,โ€Hanyang
University, ERICA Campus, South Korea,2015.
[2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in
Fog:Towards a Comprehensive De๏ฌnition of Fog Computing, ACM
SIGCOMM Computer Communication Review, vol.44, Oct. 2014.
[3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and
Its Role in the Internet of Things, Proceedings of the ๏ฌrst edition
of the MCC workshop on Mobile Cloud Computing,Aug.2012.
[4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm:
Scenarios and Security Issues, Federated Conference on Computer
Science and Information Systems, pp.1-8, Sept. 2014.
[5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware
Android Malware Classi๏ฌcation Using Weighted Contextual API
Dependency Graphs, Proceedings of the 2014 ACM SIGSAC
Conference on Computer and Communications Security, Nov.2014.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
THANK YOU
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25

More Related Content

What's hot

Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSD Paul
ย 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
ย 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
ย 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog ComputingEr. Ajay Sirsat
ย 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
ย 
Big data Presentation
Big data PresentationBig data Presentation
Big data PresentationAswadmehar
ย 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
ย 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
ย 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & PrivacyAbzetdin Adamov
ย 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
ย 
AI meets Big Data
AI meets Big DataAI meets Big Data
AI meets Big DataJan Wiegelmann
ย 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Thingsjohnson jawahar
ย 

What's hot (20)

FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
ย 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
ย 
Big data
Big dataBig data
Big data
ย 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
ย 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
ย 
Fog computing
Fog computingFog computing
Fog computing
ย 
Network forensic
Network forensicNetwork forensic
Network forensic
ย 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
ย 
Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
ย 
Big data
Big dataBig data
Big data
ย 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
ย 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
ย 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
ย 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
ย 
what is IoT
what is IoTwhat is IoT
what is IoT
ย 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
ย 
IoT Security
IoT SecurityIoT Security
IoT Security
ย 
AI meets Big Data
AI meets Big DataAI meets Big Data
AI meets Big Data
ย 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
ย 

Viewers also liked

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
ย 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
ย 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
ย 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
ย 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
ย 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
ย 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
ย 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
ย 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issuesAnastasios Economides
ย 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
ย 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
ย 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
ย 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
ย 

Viewers also liked (17)

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
ย 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
ย 
Fog computing
Fog computingFog computing
Fog computing
ย 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
ย 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
ย 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
ย 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
ย 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
ย 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
ย 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
ย 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
ย 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
ย 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
ย 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
ย 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ย 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
ย 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
ย 

Similar to Security Issues of IoT with Fog

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
ย 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
ย 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
ย 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
ย 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
ย 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
ย 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
ย 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
ย 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
ย 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
ย 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
ย 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
ย 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptxPrinceGupta789219
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
ย 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
ย 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
ย 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
ย 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
ย 

Similar to Security Issues of IoT with Fog (20)

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
ย 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
ย 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
ย 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ย 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
ย 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
ย 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
ย 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
ย 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ย 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
ย 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
ย 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
ย 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
ย 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
ย 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
ย 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
ย 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
ย 

Recently uploaded

Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 

Recently uploaded (20)

Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 

Security Issues of IoT with Fog

  • 1. SECURITY ISSUES OF IOT WITH FOG. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSE November 9, 2016 Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
  • 2. OUTLINE Introduction Existing System Problem Statement Proposed System Conclusion Future Works References Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
  • 3. INTRODUCTION Cloud: Storing and accessing data and programs over the Internet instead of computerโ€™s hard drive. IoT : Everyday objects(IoT nodes) connected through Internet, allowing them to send and receive data IoT uses: Internet : Infrastructure to interconnect IoT nodes Cloud: Background supporting infrastructure Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
  • 4. INTRODUCTION contd... Huge network latency and Backend overhead occurs as data to be processed increases in IoT cloud. So IoT uses, Fog as a solution : ie.. intermediate computing bu๏ฌ€er between IoT nodes and Cloud Adoption of IoT fog can cause many security threats, which is explored throughout Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
  • 5. EXISTING SYSTEM Title:- โ€Fog Computing and Its Role in the Internet of Thingsโ€ (F.Bonomi, R. Milito, J. Zhu, and S. Addepalli) Proposed: Fog Computing - Extension of cloud computing Features used Features: Highly virtualized platform Limitations Multi fog OS prevents from access of other OS. If there occur any problem on Kernel mode, it does not prevent. Figure: Fog with computing features Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
  • 6. EXISTING SYSTEM contd... Title:-โ€The Fog Computing Paradigm: Scenarios and Security Issuesโ€ (I. Stojmenovic and W. Sheng) Proposed: Man in the middle attack- Fog devices get replaced by fake ones. Features: Intrusion Detection method signature, behavioural or anomaly based detection method Limitations Protection methods like encryption and decryption of data consume large amount of battery on mobile devices. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
  • 7. EXISTING SYSTEM contd... Title:- Semantics-Aware Android Malware Classi๏ฌcation Using Weighted Contextual API Dependency Graphs (M. Zhang, Y. Duan, H. Yun, and Z.Zhao) Proposed: Android based malware detection Features: Uses Signature based approach for detection of malware Graphs are generated from behaviour graphs and convert it to signature and stores in database. Limitations Detection of malware from unknown or new malware family will be hectic. Figure: Android based malware to signature conversion[4] Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
  • 8. FOG COMPUTING Fog computing is an extension of cloud computing paradigm, but is a more highly virtualized platform that provides computation, storage, and networking services between end IoT devices and back-end cloud servers. Figure: The hierarchical fog computing architecture Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
  • 9. ADVANTAGES AND APPLICATIONS OF FOG Advantages Greater business agility Low latency Geo distribution Lower operating expense Applications Geographically distributed applications Fast mobile applications Large-scale distributed control systems Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
  • 10. PROBLEM STATEMENT As fog infrastructure is prone to many security threats, there is a need for studying about them deeply so as the methods discussed in the proposed systems is needed to combine which is examined in the proposed system Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
  • 11. RELEVANT SECURITY TECHNOLOGIES Security technology for IoT network When client wants to access cloud services, he must go through authentication process to ensure con๏ฌdentiality and security for IoT network. Authorized users can access cloud with mobile devices. Protocol is of two phases: Registration and Authentication. Figure: Authentication as a service Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
  • 12. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for fog node In fog Computing, much of the information is gathered into fog node. If a wrong information is spread by exploiting vulnerability is a big problem. So need dynamic analysis techniques to monitor fog node in real time Typically, the performance overhead of dynamic analysis is high. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
  • 13. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for IoT node When some IoT nodes are out of order or provide wrong information, it can a๏ฌ€ect people. Attacker has many chances to compromise various devices with sensors. The attacker is able to predict user behavior and abuse its information. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
  • 14. RELEVANT SECURITY TECHNOLOGIES contd... For IoT nodes, to be truly secure, an IoT node must also obtain application layer security. That means that the node itself, and not just the communication channel (i.e. the pipe), should be authenticated. In addition to channel authentication, encryption and data integrity should be established at the application layer to protect the data ๏ฌ‚owing through the pipe. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
  • 15. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING Man- in- the middle Attack In this attack, gateways serving as fog devices may be compromised or replaced by fake ones. Use a strong encryption between the client and the server and never connect to open WiFi routers directly. Encryption and decryption methods consume large amount of battery on mobile device. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
  • 16. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Intrusion Detection Intrusion detection system analyzes and monitors i) access control policy, ii) a log ๏ฌle, and iii)user log information in order to detect intrusion behavior. It can be run on network side in order to detect malicious activity such as DoS, port scanning. Intrusion detection techniques have been applied to mitigate attacks such as i) insider attack, ii) ๏ฌ‚ooding attack, iii) port scanning, iv) attacks on VM or hypervisor. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
  • 17. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Fog node problem In order to provide service to user, fog nodes process data received from the IoT devices. If the workloads is heavy, it is divided into several jobs and processed by several fog nodes. If some fog nodes are compounded by a malicious user, it is di๏ฌƒcult to ensure the integrity of the data. Before the computation begin, fog nodes must trust each other. An authentication protocol is required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
  • 18. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Detection Technique When some fog nodes are compromised, hybrid detection technique is useful to detect malicious code in fog nodes. It is combined with signature-based detection technique and behavior-based detection technique. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
  • 19. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Protection Messages generated from IoT devices is sent to the nearest fog nodes. When distributed and processed data is merged, the integrity of the data should be guaranteed. Because of limited resources, it is di๏ฌƒcult to encrypt or decrypt data on IoT device so light-weight encryption algorithms or masking techniques are required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
  • 20. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Management Issues Fog nodes are geographically distributed, making it di๏ฌƒcult to know data location. The user wants to be provided with the same services in other areas. It is di๏ฌƒcult for user to know whether the node provides the same service. Some fog nodes by having duplicated ๏ฌles will cause a waste of resources. IoT will create enormous amounts of data there is a need for distributed intelligence and so-called fast Big Data processing. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
  • 21. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Every communication deployment of IoT is unique. However, there are four basic stages that are common to just about every IoT application. Those components are: data collection, data transmission, data assessment, and response to the available information. Successful data management is therefore very important to the success of IoT. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
  • 22. CONCLUSION IoT cloud with fog embedded system can overcome congestion problem network latency Fog computing provides the improved quality of services to the user by complementing shortages of IoT cloud. IoT technology can be utilized in various ๏ฌelds in the future. This presentation highlights the need to con๏ฌgure the secure fog computing environment through security technologies Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
  • 23. FUTURE WORKS Future work should be done to develop a system for e๏ฌƒciently collect and analyze various logs generated in fog computing environment.. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
  • 24. REFERENCES [1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput and Heekuck Oh,โ€On Security and Privacy Issues of Fog Computing supported Internet of Things Environment,โ€Hanyang University, ERICA Campus, South Korea,2015. [2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in Fog:Towards a Comprehensive De๏ฌnition of Fog Computing, ACM SIGCOMM Computer Communication Review, vol.44, Oct. 2014. [3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and Its Role in the Internet of Things, Proceedings of the ๏ฌrst edition of the MCC workshop on Mobile Cloud Computing,Aug.2012. [4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm: Scenarios and Security Issues, Federated Conference on Computer Science and Information Systems, pp.1-8, Sept. 2014. [5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware Android Malware Classi๏ฌcation Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov.2014. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
  • 25. THANK YOU Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25