Visible to the public Security Embedded Offloading Requirements for IoT-Fog Paradigm

TitleSecurity Embedded Offloading Requirements for IoT-Fog Paradigm
Publication TypeConference Paper
Year of Publication2019
AuthorsJamil, Syed Usman, Khan, M. Arif, Ali, Mumtaz
Conference Name2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW)
Keywordscloud computing, computer network security, data management, data protection, delay tolerant networks, edge computing, embedded security requirements, Fog Computing, Fog Computing and Security, future smart networks, information processing, Internet, Internet of Things, Internet of Things (IoT), IoT-Fog based future communication networks, IoT-Fog based systems, IoT-Fog paradigm, Middle-ware, middleware, middleware technologies, offloading security, propagation latencies, pubcrawl, Resiliency, resource allocation, Scalability, security embedded offloading requirements, security embedded task offloading requirements, security provision, Task Offloading
Abstract

The paper presents a conceptual framework for security embedded task offloading requirements for IoT-Fog based future communication networks. The focus of the paper is to enumerate the need of embedded security requirements in this IoT-Fog paradigm including the middleware technologies in the overall architecture. Task offloading plays a significant role in the load balancing, energy and data management, security, reducing information processing and propagation latencies. The motivation behind introducing the embedded security is to meet the challenges of future smart networks including two main reasons namely; to improve the data protection and to minimize the internet disturbance and intrusiveness. We further discuss the middleware technologies such as cloudlets, mobile edge computing, micro datacenters, self-healing infrastructures and delay tolerant networks for security provision, optimized energy consumption and to reduce the latency. The paper introduces concepts of system virtualization and parallelism in IoT-Fog based systems and highlight the security features of the system. Some research opportunities and challenges are discussed to improve secure offloading from IoT into fog.

DOI10.1109/MTTW.2019.8897219
Citation Keyjamil_security_2019