A Comprehensive Analysis of Fog Layer and Man in the Middle Attacks in IoT Networks

Preethi Vennam, S. K. Mouleeswaran, Shamila Shamila,Satish R. Kasarla

2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon)(2022)

引用 1|浏览0
暂无评分
摘要
Cyber-attacks and data breaches have become increasingly common in recent times, targeting industries and companies across segments due to vulnerabilities in Internet of Things (IoT) devices. IoT devices have increased exponentially and their communication protocols have also increased, which in turn have increased the number of zero-day attacks. IoT devices can be accessed from anywhere in the world, have limited hardware capability and are heterogeneous in nature which makes securing these devices highly difficult. To implement an IoT based network, logical, network and software element design based on fog computing architecture is gaining prominence. It allows flexibility for users to communicate and manages the data efficiently by optimizing the stored data. The main objective of the survey paper is to review the technology of fog computing in the IoT system and how to prevent the Man-in-the-Middle Attacks in this layer. The survey will mainly focus on the factors associated with a Man-in-the-middle attack at the fog layer which is of great concern in terms of privacy, security, and agility.
更多
查看译文
关键词
Internet Of Things (IoT),Fog Computing,Attacks,Nodes,Man-in-the-Middle Attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要