Research on Internet of Things security architecture based on fog computing

4Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. Fog computing is the infrastructure that can use processing power anywhere in the cloud. Virtual computing extends the power of cloud computing to the edge of the network, enabling any computing device to host and process software services, analyzing and storing data closer to where data are generated. The architecture of the fog computing brings enormous processing power. Since its processing power is often located near the required equipment, the distance of data transmission is reduced and the delay is reduced. This article explores how to use the fog computing layer between the cloud data center and the end node layer to store and process large amounts of local data in a timely manner, speeding decision making and enabling Internet of Things manufacturers and software developers to limit their ability to send data. They reduced cloud computing costs and built a reasonable security architecture.

Cite

CITATION STYLE

APA

Mai, T. D. (2019). Research on Internet of Things security architecture based on fog computing. International Journal of Distributed Sensor Networks, 15(11). https://doi.org/10.1177/1550147719888166

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free