IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Towards the Protection and Security in Fog Computing for Industrial Internet of Things

Towards the Protection and Security in Fog Computing for Industrial Internet of Things
View Sample PDF
Author(s): G. Rama Subba Reddy (Mother Theresa Institute of Engineering and Technology, India), K. Rangaswamy (Sai Rajeswari Institute of Technology, India), Malla Sudhakara (VIT University, India), Pole Anjaiah (Institute of Aeronautical Engineering, India)and K. Reddy Madhavi (Sree Vidyanikethan Engineering College, India)
Copyright: 2021
Pages: 16
Source title: Innovations in the Industrial Internet of Things (IIoT) and Smart Factory
Source Author(s)/Editor(s): Sam Goundar (British University Vietnam, Vietnam), J. Avanija (Sree Vidyanikethan Engineering College, India), Gurram Sunitha (Sree Vidyanikethan Engineering College, India), K. Reddy Madhavi (Sree Vidyanikethan Engineering College, India)and S. Bharath Bhushan (Sree Vidyanikethan Engineering College, Tirupati, India)
DOI: 10.4018/978-1-7998-3375-8.ch002

Purchase

View Towards the Protection and Security in Fog Computing for Industrial Internet of Things on the publisher's website for pricing and purchasing information.

Abstract

Internet of things (IoT) has given a promising chance to construct amazing industrial frameworks and applications by utilizing wireless and sensor devices. To support IIoT benefits efficiently, fog computing is typically considered as one of the potential solutions. Be that as it may, IIoT services still experience issues such as high-latency and unreliable connections between cloud and terminals of IIoT. In addition to this, numerous security and privacy issues are raised and affect the users of the distributed computing environment. With an end goal to understand the improvement of IoT in industries, this chapter presents the current research of IoT along with the key enabling technologies. Further, the architecture and features of fog computing towards the fog-assisted IoT applications are presented. In addition to this, security and protection threats along with safety measures towards the IIoT applications are discussed.

Related Content

Sandhya Avasthi, Tanushree Sanwal, Shivani Sharma, Shweta Roy. © 2023. 23 pages.
Subha Karumban, Shouvik Sanyal, Madan Mohan Laddunuri, Vijayan Dhanasingh Sivalinga, Vidhya Shanmugam, Vijay Bose, Mahesh B. N., Ramakrishna Narasimhaiah, Dhanabalan Thangam, Satheesh Pandian Murugan. © 2023. 17 pages.
Aditya Saxena, Devansh Chauhan, Shilpi Sharma. © 2023. 26 pages.
Eduardo José Villegas-Jaramillo, Mauricio Orozco-Alzate. © 2023. 33 pages.
Revathi A., Poonguzhali S.. © 2023. 18 pages.
Indu Malik, Anurag Singh Baghel. © 2023. 18 pages.
Shanu Sharma, Tushar Chand Kapoor, Misha Kakkar, Rishi Kumar. © 2023. 24 pages.
Body Bottom