Archives

Dynamic Orchestration of Fog Nodes

Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT

  • June 7, 2020
  • Comments off

Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services […]

Read More

Security as a Service Platform Leveraging
Multi-Access Edge Computing Infrastructure
Provisions

  • June 7, 2020
  • Comments off

The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible […]

Read More
MEC Threat Vectors

Realizing Multi-Access Edge Computing
Feasibility: Security Perspective

  • October 28, 2019
  • Comments off

Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of […]

Read More
IoT_book_chapter

Introduction to IoT Security

  • September 5, 2019
  • Comments off

In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart everything, the Internet of Things (IoT) security plays a centric role with no margin for error or shortage on supply. Securing, including the authentication of these […]

Read More