IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i8p1298-d793476.html
   My bibliography  Save this article

Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective

Author

Listed:
  • Tariq Ahamed Ahanger

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Usman Tariq

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Atef Ibrahim

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Imdad Ullah

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Yassine Bouteraa

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Fayez Gebali

    (Electrical and Computer Engineering Department, University of Victroia, Victoria, BC V8P 5C2, Canada)

Abstract

The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. Additionally, it covers future research objectives in the crucial field of IoT security.

Suggested Citation

  • Tariq Ahamed Ahanger & Usman Tariq & Atef Ibrahim & Imdad Ullah & Yassine Bouteraa & Fayez Gebali, 2022. "Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective," Mathematics, MDPI, vol. 10(8), pages 1-20, April.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:8:p:1298-:d:793476
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/8/1298/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/8/1298/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:8:p:1298-:d:793476. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.