Next Article in Journal
Collision-Free Advertisement Scheduling for IEEE 802.15.4-TSCH Networks
Next Article in Special Issue
Object Tracking for a Smart City Using IoT and Edge Computing
Previous Article in Journal
Experimental Setup and Measuring System to Study Solitary Wave Interaction with Rigid Emergent Vegetation
Previous Article in Special Issue
Integration and Exploitation of Sensor Data in Smart Cities through Event-Driven Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

1
Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan
2
College of Technological Innovation, Zayed University, Abu Dhabi 144534, UAE
3
Department of Computer Science, Liverpool John Moores University, Liverpool L3 3AF, UK
4
School of Computing, Mathematics and Digital Technology, Manchester Metropolitan University, Manchester M1 5GD, UK
5
Faculty of Informatics, Masaryk University, 60177 Brno, Czech Republic
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(8), 1788; https://doi.org/10.3390/s19081788
Submission received: 19 February 2019 / Revised: 29 March 2019 / Accepted: 12 April 2019 / Published: 14 April 2019
(This article belongs to the Special Issue Smart IoT Sensing)

Abstract

:
The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.

1. Introduction

Industries are adopting the emerging Internet of Things (IoT) paradigm and cloud computing services for the monitoring and controlling of critical applications associated with industrial control systems, smart grids, and other critical infrastructures [1,2,3]. In addition, industries are always concerned about the efficiency and how to reduce operational cost. They look for solutions that improve the performance, i.e., system stability, flexibility, fault tolerance and cost effectiveness, which may increase the interactivity and complexity [4]. The concept of IoT combined with cloud computing enables the systems to cater such industrial needs. The idea of IoT emerged as a result of interconnecting several kinds of physical devices [5]. The IoT provides users with innovative business models, modern embedded devices and better connectivity. The network through which these physical devices are interconnected lets them exchange data and communicates with each other. These devices can be sensors, smart meters, smart vehicles, smartphones, PDAs, Radio-Frequency IDentification (RFID) tags and any other device with embedded software [6]. Additionally, the automation is extended to the daily life of humans and lets IoT to be implemented in several domains such as smart homes, smart grid, smart city, e-healthcare, industrial automation, and intelligent transportation.
IoT devices generate a massive amount of confidential and security-sensitive data. Cisco expects that 50 billion devices would capture the Internet by 2020, and it will reach to 500 billion by 2025 [7,8,9]. It has also been predicted that the amount of generated data would approach 500 zettabytes by 2019. However, global data center’s IP traffic would merely reach 10.4 zettabytes [10]. However, cloud computing provides on demand storage and processing services for such kind of big data; there is a tradeoff between storage and latency. Most user-generated data are huge and need high bandwidth for transmission. Thus, moving the big data from the edge of the Internet to data centers, which are generally located near the core network and in places where operating cost is the lowest, is a challenging task [11,12,13]. Additionally, users’ experience with delay-sensitive applications such as real-time games, emergency services and human–computer interfaces, might be ruined when unexpected delays occur. Therefore, the importance of cloud computing cannot be ignored even for future innovations, yet there has emerged fog computing that might overcome the traditional drawbacks inherited from cloud computing such as latency issues, unavailability of location awareness, mobility support and bandwidth obstacles. Fog computing puts a substantial amount of communication, control, storage and management at the edge of a network as opposed to establishing dedicated channels to a more centralized remote cloud infrastructure. This approach reduces service latency, improves the Quality of Service (QoS) and provides a superior experience to end-users. It is estimated that fog computing would be used for 45% of IoT-generated data [10], and can be installed within the close range of IoT sensors and devices for local processing and data storage [14].
The Federal Trade Commission (FTC) Report on IoT urged business to adopt best practices to address consumer privacy concerns and security risks [15]. This report warns that smart devices are involved in harvesting huge amount of personal information and are exposed to a variety of potential security threats, such as unauthorized access and misuse of personal information. Data originating from ubiquitous devices are usually stored in cloud infrastructures, which not only attract intruders but also stakeholders, such as service providers and cloud operators interested to use these data for their own benefits (e.g., advertising) [16,17]. Fog computing can help to address some security concerns related to IoT-generated data. For instance, fog computing facilitates the on-site data storage and analysis of time-sensitive heterogeneous data by reducing the amount of confidential data stored and transmitted to the cloud. However, fog computing has its own privacy and security challenges due to low latency, proximity to IoT devices, decentralized architecture and transient support [8,18].
This research was conducted to understand the challenges to secure future digital infrastructure while it is still evolving. The key contributions of our study are as follows:
  • An in-depth analysis of the fog computing security challenges, big data privacy, and trust concerns was performed in relation to fog-based IoT along with their existing solutions and respective limitations.
  • It enacts the securing of big data with a novel functionality-based fog architecture taxonomy to categorize threats and security challenges in fog-enabled IoT systems accompanied by fog-enabled IoT applications security requirements. This provides a comprehensive comparison of state-of-the-art contributions in the field according to their security service.
  • Study of complementary interrelationship between blockchain and fog computing exploring blockchain-based solutions to cater privacy and security problems in fog paradigm along with the review of security requirements analysis of the fog-enabled IoT application with the combined blockchain.
This paper is structured as follows: Section 2 defines IoT and explores several IoT applications. Section 3 consists of fog computing generic and functionality-based architectures. Section 4 presents Fog-enabled IoT applications security requirements followed by fog computing security challenges in Section 5. In Section 6, we highlight interrelationships between blockchain and fog computing along with the blockchain-based security solutions in fog-enabled IoT systems. Finally, the conclusion is drawn in Section 7.

2. Data-Intensive IoT Applications

Any physical object that has the ability to connect over the Internet for data collection purposes with certain storage capacity and processing power is called a “thing” or IoT object. These “things” can be small sensors, mobile phones, gadgets, actuators or anything. Things are not only complex devices such as mobile phones, but can also be daily life things, such as food, a piece of art, furniture, landmarks, etc. IoTs have several areas of applications, from home automation to business functional areas such as logistics, transportation, health care, safety, intelligence and many morem as shown in Figure 1. Some of the most common data-intensive application are described below.

2.1. Smart Homes

Citizens are investing heavily in smart homes to save money and gain control of their homes and their lives. Smart homes use sensors and actuators attached to appliances and gadgets connected wirelessly to the home network and can communicate with each other to provide consumers with a seamless user experience. Various kinds of sensors installed in the homes constantly collect data from the surroundings and perform different intelligent home-related functions such as automatic turning on and off lights, appliances and gadgets, temperature control, security and many more. Sensors are heterogeneous, therefore the collected data are of various kinds. For example, sensors are installed to detect fire, humidity, gas leak, temperature changes, etc. If there is gas leak, for instance, it turns off the gas outlets automatically. There are also floor sensors installed to sense the pressure and track the movements of residents; in the case of any suspicious movement or falling of a person on the floor, they generate relevant actions. Smart homes also use surveillance cameras to record the activities or movements of the residents [8,19]. Energy conservation is another important function that can be achieved through smart home application [20].

2.2. Smart Cities

The smart city is a vast yet an important application of IoT [8,21]. It is implemented mainly to address specific issues related to citizens well-being such as traffic management, energy, transportation, and education. The smart city heavily relies on smart sensor devices to collect data such as temperature, humidity, pollution, and traffic conditions. For example, sensors are installed at the city water reservoirs and homes for the efficient utilization of water resources. Sensors installed at homes keep the record of the amount of water supplied, timings, pressure and other things. In addition, users can monitor the water meters for the billing purpose [8]. Smart traffic management is another smart city application where data collected from different sensors located in the city help in regulating the flow of traffic in response to demand. Such applications of the smart city lead to an exponential increase in data, which bring many problems and challenges, such as data security and privacy.

2.3. Smart Healthcare

Managing health services is another important task that has been automated using smart IoT-based e-health systems [22]. Technologists have developed many wearable smart devices, which monitor user’s overall health conditions. These devices keep the record of the patients’ health and generate alerts in the case of any abnormal activity. For example, smart e-Health services are proven very useful for the elderly and disabled individuals who find difficulty in movement. IoT systems can be deployed to remotely collect medical data (such as heart rate, physiological data, and blood pressure), and transmit these data to healthcare big data centers for storage and diagnosis [8,23]. Given the extreme sensitivity and confidentiality of the collected medical data, one of the most significant threats to healthcare services is that of data security and privacy [24].

2.4. Smart Environment and Agriculture

The technology has played a vital role in easing the daily life of the humans, yet there are dark sides which need to be addressed for their betterment. The smart environmental systems help in monitoring and controlling the environment. Air pollution has become a devastating issue around the globe. Smart environment applications use the sensors to detect the humidity, temperature, etc. Smart agriculture systems are used by farmers to get the greater yield of crops with better quality. The environmental parameters that are required for agriculture such as soil information, temperature, humidity, pesticide control, etc. are collected by sensors and sent to the servers. These parameters are analyzed in real time to guide the farmers about the condition of the soil and whether it is appropriate for the cultivation. Thus, it helps in producing the quality crops [8,25].

2.5. Energy Conservation

The smart grid is another useful yet complex application of IoT [26]. Smart grids have become the need of this time, which introduces a distributed and user-centric smart power grid system that aims to provide a reliable, efficient, secure and quality energy supply [27]. Smart grid technology comprises the two-way smart and intelligent flow of information is between consumer and the supplier. IoTs or sensors are installed at consumers’ place and the grid stations [28]. The sensors installed at consumers’ site are responsible to collect data related to electricity supply, consumption patterns, smart metering, pricing and other details. While the sensors at grid stations monitor the supply, distribution, discontinuity of supply, location identification, consumers’ information, etc. The data collected from those sensors are sent to their respective control centers where relative warnings are generated for smart and optimal distribution of electricity. A successful implementation of smart grid system requires explicit security and privacy solutions to maintain data confidentiality.

3. Fog Computing Architecture

Fog computing provides decentralized on-demand services and applications for managing and analyzing big data directly at the network’s edge. It provides storage, processing, controlling and networking analogous to cloud computing. The fog layer serves as an intermediary between IoT devices and the cloud. The term fog-enabled IoT system is not new and has already been used in the literature [29,30,31]. For example, Byers [29] discussed some important architectural requirements for fog-enabled IoT systems along with a wide variety of potential IoT use cases, applicable to many vertical markets (i.e., transportation, utilities, smart cities, manufacturing, retail, agriculture, and health etc.). Azimi et al. [32] proposed a fog-enabled healthcare IoT system that is based on a three-layer architecture: sensor layer, fog layer and cloud layer. However, to the best of our knowledge, there is no standard architecture for fog computing [9]. We can broadly classify the fog-enabled IoT systems into three layers, as illustrated in Figure 2: IoT device layer, fog layer and cloud layer. For example, a fog-enabled IoT application of smart city collects data through various sensors, and offload some computations to the fog layer. This may also include the analysis and processing of delay-sensitive data at the fog layer. Moreover, if further computing and processing is required and it is not time crucial, the data can be sent to the cloud.
In this work, we classified fog architecture into three distinct layers, which is inline with the architecture proposed in [16], as shown in Figure 3:
  • Core-network and service layer
  • Data center layer
  • Device layer with inter and cross layer communication technologies
The core layer is responsible for providing network, management and other services to the end users. It encompasses fog nodes, e.g., routers, bridges, gateways, switch, base stations, etc. They are assisted with computing resources and local servers entailing controllers, embedded computing, smart phones and cameras. Network connections are used to deploy these fog nodes wherever needed, for example on roadsides, factory floors, power stations and in smart phones and vehicles. Infrastructure providers deploy data centers, which are found on edge of the network. Data center layer is responsible for multi-tenant virtualization infrastructure, which is used for scalability, flexibility and for enhanced computation, storage and other resource sharing requirements to meet user demands. It is used to achieve data and IoT application isolation and security for a concurrent and independent processing. Although these data centers are interconnected with the cloud layer through the network infrastructure, they can work and cooperate autonomously. The computing and storage capacity increases as we move forward from device to cloud in chronological order. There are two types of devices involved at the device layer: Mobile-IoT and fixed-IoT devices [8]. Mobile devices encompass peripatetic devices such as smart watches, smartphones, trackers, etc., whereas fixed-IoT devices have specific functions and remain stationary at particular locations, such as sensors and RFID tags. They are constrained in terms of storage and computing resources with limited bandwidth [33]. Due to their limited characteristics, they are not suitable for responding to emerging events and occurrences and are mainly used for data collection and submission to a higher layer.
Due to the underlying differences between cloud computing and fog computing, security solutions proposed for cloud computing may not suit fog services, which are available to end users at the edge of networks. This might impact the adaptation of fog-enabled IoT systems. Therefore, addressing security concerns at fog layer could enable fog paradigm to provide not only additional computational resources, but also adequate level of security to minimize cyber-attacks in fog-enabled IoT systems. Apart from fog security, the security of fog-enabled IoT systems is equally important for ensuring veracious data analysis and decision making. The security requirements and challenges in both fog-enabled IoT applications and fog layer are further elucidated in subsequent sections.

4. Fog-Enabled IoT Applications Security Requirements

As discussed in the previous section, fog-enabled IoT applications are going to be used in every field of life. These networks of smart devices are expected to be remote in nature and use wireless connection for communicating with other IoT devices or fog nodes [34]. This wireless communication medium is vulnerable to various network attacks, such as eavesdropping, etc. (Table 1 presents a list of different security threats to IoT-enabled applications). Thus, the most crucial security properties regarding data security are confidentiality, integrity, and availability. Confidentiality ensures adversaries do not gain unauthenticated and unauthorized access to data. Integrity refers to the completeness and accuracy of data. While, the availability of data and resources guarantees provisioning of network services and data to authorized users when required. In fog-enabled IoT applications, if these properties become compromised by attackers, the result may be devastating and disastrous. Another important factor in the security of IoT applications is the lack of standardized security. Mostly, IoT devices are manufactured by different vendors and the security of these devices lacks industry-accepted standards. Since many IoT security frameworks exist, there is no single agreed-upon framework. Big companies and industry organizations may have their own precise standards, while certain sectors have proprietary, incompatible standards from industry leaders. The variety of these standards makes it difficult to not only secure systems, but also to ensure interoperability between them. Furthermore, authorized entities may start misbehaving to exploit IoT devices with respect to offensive data manipulation, false data injections and so on. Besides that, IoT applications are largely deployed as Low power and Lossy Networks (LLN), such as wireless sensor networks, smart city, and smart health applications. The LLN are a class of networks where the interconnected devices are highly resource constrained (power, memory, processing, etc.), and are characterized by high loss rates, low data rates and instability in the communication links [35]. Conventional cryptography and trust-based security protocols consume power, storage and computing resources and may result in message overhead and low trust convergence. In IoT environment, existing solutions do not seem to be effective in the sense of security and protection against internal attacks. Table 2 presents a list of internal attacks on the fog-based IoT applications routing mechanism. Moreover, Existing security mechanisms do not take into account the impact of device mobility, which is essential in scenarios such as smart city, smart health, etc. The interconnecting devices such as gateways or field devices can also easily be targeted by hackers from various network communication interfaces. Therefore, all smart devices, for example in a smart home environment, need to be secured with strict security mechanisms; otherwise, an attack on any individual device may result in the malfunctioning of the whole network [36].
IoT systems can be established by connecting sensors with a distributed data transmission system for remote access, processing and storage. Thus, the biggest threat in this working environment is the data security breach, which is often high due to its complex nature at rest and in transit. For example, Liu et al. [37] discussed the significance of secure data transmission among WLAN-based IoT applications. Moreover, the architecture of IoT devices make it difficult to embed security solutions in every device. Therefore, the need of integrating the fundamental security controls in devices and applications arise while considering the ecosystem where these devices are used. The major challenge is the privacy and security of the data generated by home sensors and detectors. The collected data are stored at multiple locations, e.g., on the connected device itself, in the cloud, at the edge, or in on-premises infrastructure. Researchers and cyber security experts are routinely uncovering vulnerabilities in smart homes IoT devices, which could lead to unauthorized access to consumer data, and compromise consumer privacy, security and safety [8,38]. In smart city domain, secure interactions and verification are also prodigious security concerns [39]. It should support the digital forensic investigation among the connected components [36] along with implementing and maintaining the end-to-end security and privacy supports for data acquisition, transmission and processing [40]. The system should be equipped with lightweight cryptography-based policies for working in an environment where the resource-constrained IoT devices are in abundance [41].
The health care related IoT applications generally deal with patients personal data, which are subject to data breach if proper security measures are not in place. The devices used in these applications are generally low in processing and storage, due to which they cannot integrate additional security protocols. In addition, these applications are mobile in nature (i.e., they may require to be connected to any public network such as home and office), thus making these applications more vulnerable to tempering and forgery attacks. The increasing number of IoT devices have also made it difficult to design a dynamic and stable security system that can guard against all the possible security threats [42].
Similarly, smart grids are the hot points for security and privacy attacks during collecting, receiving and sharing data. If an attack is successful, it may result in the deterioration of government services such as telecommunication companies, energy distribution and other associated services [43]. The loss may be in the form of data or service impairment. The main source of these attacks is the unauthorized access to the network, which results in the alteration or destruction of database.

5. Fog Computing Security Challenges

Cloud computing has significant weaknesses to protect its computing framework and storage from malicious attacks [62,63]. Some of the security and privacy threats are summarized in Table 1. Fog-based architectures are more secure than cloud architectures for several reasons including less dependency on the Internet and possible storage and information exchange between the cloud and its users in non-real-time [64]. Fog-enabled IoT systems employ various networks for interconnecting all the participating devices, such as wireless and mobile core networks making them potential targets for any attack [65]. Network monitoring can be helpful in detecting anomalies and security vulnerabilities [66].
Therefore, the analysis of these top layers becomes more critical from security point of view. Furthermore, in some of fog-enabled systems, the core infrastructure is implemented by same party who manages these centers [16,67,68]. A virtualization infrastructure in edge data centers can be integrated to give the ability for deployment of cloud at the network edge. The biggest threat in this system is potential attacks on virtual machines [69,70,71].
In the real-world, the data centers are a hub of virtualization servers along with other managerial services controls. From security prospective, the whole edge data center is at great risk as it includes all public APIs, which are responsible for providing the services to connected users and other access points such as webs applications [72,73]. Individual IoT devices are also the rudimental targets for security attacks as they actively participate in data transmission [74,75]. However, the extent of damage by a compromise of these devices is very limited as they can influence only the network segment they are attached to, which makes them low-risk compared to the previously discussed threats.
Fog security challenges are divided into three major classifications, as described in Section 3: (a) core-network and service level; (b) data center level security; and (c) device level. Figure 4 shows a taxonomy of these security challenges and the following subsections present detailed discussions of these challenges.

5.1. Core-Network and Service Level Challenges

The core-network and service layer leads to maintain a hierarchical multi-tiered architecture. The underlying core infrastructure, such as mobile core infrastructure or centralized services makes it easy to manage and register various services [16]. As in cloud, fog also has capabilities to provide storage and processing of data collected from local IoT devices. With this facility, the fog can handle real-time local computational services. Specifically, IoT applications and services are offered by the fog nodes, which are installed at the network edge to control activities as well as decision-making tasks based on the data collected from IoT devices with the response time of milliseconds [76]. Therefore, it is possible to develop several delay-sensitive IoT applications that can be used for quick decision-making activities while collecting local data from these IoT devices. Smart traffic lights, healthcare and activity tracking, and decentralized vehicular navigation are a few of the delay-sensitive IoT applications that are fog assisted.
There are several proposals in the literature to secure core-network and overcome real-time service challenges, which are summarized in Table 3 and discussed below.

5.1.1. Identity Verification

Identity verification is referred to as the authentication of a legitimate IoT device within an IoT network to use fog-based services. IoT devices must verify their identities to avail fog services in a secure manner. Several authentication schemes are proposed in the literature [9,77,78]. These schemes support IoT services and build secure fog computing environment. An effective technique is the cooperative authentication mechanism [8], which focuses on the minimization of authentication overhead by removing redundant authentication messages to reduce the delay caused by the authentication process. In real-time services, another challenging issue is related to user privacy. To fulfill user privacy requirement, anonymous authentication mechanisms have been adopted to authenticate users without revealing their identity [79].

5.1.2. Access Control

Access control determines permissibility of certain network resources to only those devices/users who possess certain rights to use the requested resource. Authorization is just as important as authentication in fog computing. Due to heterogeneity and poor security controls in IoT devices, it is often easier for attackers to gain access to these devices. Salonikias et al. [80] proposed a role-based authorization in traditional web services in which administrators have to regulate access rights. In [81], attribute-based encryption is proposed, in which predefined attributes of users must be satisfied [82,83]. However, there are open challenges related to multiple devices for predefined policies.

5.1.3. Lightweight Protocol Design

In real-time services, short-range communication between IoT and fog nodes one or two hops away may have a significant impact on the overall system performance. Due to the resource-constraint nature of IoT devices, there are several lightweight protocols designed to resolve these runtime issues. The authors of [84] provided multiple lightweight cryptography schemes including hash functions and stream chippers for secure end-to-end communication.

5.1.4. Intrusion Detection Challenges

Many intrusion detection techniques have been proposed in the literature to reduce the success of attacks such as flooding, insider attacks, pot scanning, and attacks on a virtual machine and on hypervisor in the cloud system. Intrusion detection mechanisms monitor a network for distinguishing between malicious and benign nodes/activities. These mechanisms monitor and analyze user login information, log files and access control policy to identify any malicious activity on the network. For secure fog, intrusion detection is one of the important elements. There are several proposed works such as the host-based intrusion detection system [27], which collects from the cloud information including systems calls and file systems and then analyzes it. Arshad et al. [85] proposed a model for intrusion detection with minimal human intervention and response time. Hamad et al. [86] introduced intrusion detection system as a cloud service. Houmansadr et al. [87] proposed a mobile phone-based intrusion detection system.

5.1.5. Trust Management

Although identity verification and access control create a trustful connection between fog nodes and IoT devices, to procure authenticated misbehaving nodes projecting insider attacks still pose a challenge. Some of the important internal attacks are discussed in Table 2. A certain trust levels among fog network devices is needed as well as a resilient security mechanism to prevent such internal attacks. Hence, trust-based mechanisms are widely used to cater such issues. There are so many definitions given to trust in the literature. Here, trust is defined as an acceptance level between two nodes for a defined action. The trust value is used to imitate whether a sensor node is eager and able to perform normally. A threshold is set for the node to be tagged as good or bad. The range of the trust value is mostly between 0 and 1 [88]. Often, 0 refers to completely malicious and 1 is the opposite. For mobile social networks, an investigation of trustworthy user’s evaluation service was proposed by [89] to mitigate the capabilities of Sybil attacks. There might be multiple trust levels of fog nodes. Therefore, for real time services, there is no cooperation between patterns behaviors, which causes a lack of trust management. Different trust management schemes are adopted in [90,91] to analyze different trust management models. Wei et al. [92] proposed a direct evidence-based trust management scheme. Su et al. [93] contributed an attribute-based trust management scheme.

5.1.6. Privacy-Conserving Packet Forwarding

Data packets that are received either from IoT devices or other fog nodes are forwarded through fog nodes, hence it is mandatory to preserve privacy of forwarded packets [8]. Resource constrained and mobile nature of IoT networks cause distinct packet forwarding features in fog-enabled IoT system. End-to-end connectivity is difficult, thus cooperation of other nodes is required for message delivery. Selfish nodes may become reluctant to be a part of message forwarding due to consumption of limited resources such as energy. Moreover, malicious nodes may collude to be the part of the route to perform malicious activities on data packets [94]. Therefore, privacy-conserving packet forwarding is a must. There are many security solutions such as remote data integrity verification, which allows the user or other trusted party to verify the data integrity. Data encryption before uploading on fog node by IoT devices is a fundamental requirement that secures the data from privacy leakage. Encryption of data by IoT devices causes an obstacle to share data with trusted parties. An atomic proxy cryptography scheme was proposed by Blaze et al. [77], in which semi-trusted proxy convert cipher-text by a sender is decryptable by a receiver without watching the original plain text through proxy encryption key. Blaze et al. [77] proposed chosen cipher-text-based secure proxy re-encryption. Canetti et al. [95] proposed a conditional proxy re-encryption that meets various data sharing requirements. For secure data sharing, the authors of [96] proposed attribute-based re-encryption in which secret key assignment is based upon attributes of the user. The authors of [97] proposed Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Key-Policy Attribute-Based Encryption (KP-ABE) schemes with a difference of associated access policies. Intermediate networks are utilized for IoT devices and cloud communication to build two-way communication by fog nodes. End-to-end security is a basic requirement to prevent sensitive data to disclose during transmission. It degrades properties of data sharing such as aggregation, search, and sharing.

5.1.7. Rogue Fog Node Detection

In fog environments, IoT devices transmit data to fog nodes, which process those data to provide services to the users. The workload is divided and assigned to several fog nodes to be processed in the case it is increased. A fog node is considered as rogue fog node when it acts as a legitimate node, but it is rather a compromised node. Hence, ensuring data integrity becomes a difficult task if any fog node is compromised by malicious activity. Therefore, the trust among fog nodes must be ensured before any data processing and computation starts. This requires an authentication protocol that may enable trust among nodes. In the case there are many data to be processed, fog nodes that are authenticated by the cloud should not be located anywhere outside the fog environment. The authors of [98,99] demonstrated the possibilities of man-in-the-middle attack where the gateway is swapped by fake or compromised one. The existence of a compromised node in the environment can be a threat to data integrity, security and privacy of user information. There are several reasons that such issues are difficult to address, among which the most important ones are: (i) trust management schemes to cater complex trust situations; and (ii) difficulty to maintain the list of rouge nodes due to creating and deleting Virtual Machine (VM) instances dynamically [98]. There are different attack resilient trust-based routing mechanisms to help in detecting rogue fog nodes [100,101].

5.2. Data Center Level Security Challenges

The fog is equipped with resources that can be used for storing big data collected from IoT devices temporarily. This makes the data readily available to be frequently accessed by users, as well as helpful in maintaining and updating the data in a well-organized and flexible way. This temporary storage on fog nodes significantly reduces the delay in communication between the fog and the cloud and, hence, cuts down the response time to access and update the data. Fog data centers act as the intermediate devices in networks taking up the responsibility of performing different communication functions such as data collection and assembling, packet transfers and routing. The fog data centers are also capable of simple processing of the received data and can select the appropriate audience for data distribution. Fog data centers serve the purpose of implementing a multi-tenant virtualization setup. These systems work under the control of infrastructure providers. These data centers are used by every user including consumers and infrastructure providers. These edge data centers work autonomously while cooperating with other connected devices, but they are also interconnected with traditional cloud centers. Thus, there is a possibility to implement multi-tiered architecture using network infrastructures for network formation. For the implementation of this system, we have to evaluate the existing support infrastructure systems such as mobile core networks and centralized cloud services. The fog-based systems are heterogeneous in nature, which allows high speed wireless connections and technologies to work together [16,102]. Large-scale data collection and distribution is expressively optimized because of the involvement of fog nodes. Fog nodes and IoT maintain temporary data as a transient storage to reduce big data management complexity. It is also very crucial to safeguard data distribution and dissemination. However, some security and privacy issues seriously affect data privacy. There are several challenges and proposed solutions found in the literature; some are surveyed in the following subsections and are summarized in Table 4.

5.2.1. Data Identification, Aggregation and Integrity

IoT devices generate huge amount of data, but not all of the data are useful. These devices are unable to identify and distinguish sensitive and important data out of the generated data. Sensitive data identification, aggregation and integrity are critical challenges for fog-enabled IoT systems before uploading to data centers. Data must be aggregated as big data are being generated and collected by several IoT devices and identified as sensitive and required data before processing. Although it is difficult for IoT devices to identify sensitive and useful information, it is possible to classify IoT devices having sensitive data. Furthermore, there is an important requirement to temporarily maintain the data in transient storage to minimize management complexity. However, there are some privacy issues, which affect data confidentiality, integrity and sharing. Ghafir and Prenosil [103] presented a novel mechanism to identify malicious downloaded data. To achieve aggregation, there are several techniques presented in the literature. In [104,105], the authors proposed Paillier encryption, which is widely implemented for smart grids. Lu et al. [106] designed an efficient data aggregation scheme for fog-assisted IoT devices through homomorphic Paillier encryption. In [78,81], a homomorphic scheme is adopted to achieve encrypted data processing. For searchable encryption, the authors of [107,108] adopted different privacy levels to make searchable data without information exposure. Yang et al. [109] proposed a location-based services to limit user access for out of range areas. Boneh et al. [110] achieved encrypted mail that is searchable on unreliable mail services. Iovino et al. [111] implemented an encrypted data search based on multiple keywords.

5.2.2. Secure Content Distribution

Information leakage due to content distribution services is controlled by multiple states of the arts. The authors of [112] proposed a secure discovery scheme to ensure authorized user identification for the discovery of information. Park et al. [62] suggested a broadcast encryption scheme by delivering encrypted information at the broadcast channel. To protect data privacy at fog nodes, decentralized computing is adopted to secure data from attacks. Papamanthou et al. [113] proposed a verifiable computational scheme based on content-based encryption mechanism. Choi et al. [79] proposed a model design for dynamic computation at fog environment.

5.2.3. Distributed Computation Challenges

Fog computing is capable of transient storage and computing, where several fog nodes can perform decentralized data computation cooperatively. Fog nodes can take up cloud computational tasks and act as proxies to help users in performing heavy processing tasks. Computation offloading, aided computation, and big data analytics are some of the important fog assisted IoT applications where decentralized computation is involved [114]. Fog nodes can perform certain computational activities such as processing of data and analysis. Due to potential security breaches in fog computing, the data to be processed may be available to attackers to gain control of the computational results and it may compromise fog node performance. Hence, ensuring data privacy becomes a huge concern for users when they assign computations to fog nodes.

5.2.4. Secure Big Data Analysis

Big data is the amalgamation of many technological revolutions that aim at addressing the processing capabilities and storage capacity of systems. Furthermore, the large volume of heterogeneous data are being analyzed using big data analytics that employs many advanced and parallel data analysis techniques. Fog nodes collect big data for processing and analysis in the form of text, images and videos. However, the data analysis techniques also pose many threats regarding the privacy and security of personal data as the data are obtained, stored and analyzed on any available online sources. Thus, the Internet users are prone to privacy infringements, as their personal data can be used in any form, for any type of analysis, and these tools are capable of extracting sensitive and important information. To counter security issues, several traditional techniques for data security are being employed. However, they are unable to counter these problems due to the complexity and heterogeneity of big data [115]. Therefore, there is a need for developing new and advanced security systems. To address such challenging issues, e.g., securing users data privacy and analyzing data instantaneously, fully homomorphic encryption [116] and differential privacy are commonly applied. Li et al. [116] proposed cloud-aided privacy-preserving frequent item set mining scheme for vertically divided databases. Xu et al. [117] advocated the use of certificate-less proxy re-encryption scheme that uses randomized and re-encryption keys for data sharing while restricting the control over privacy settings and trust on cloud environment. A Hilbert curve-based cryptographic transformation technique is presented in [118] to protect privacy along with improved querying process for outsourced databases. The data confidentiality along with query result integrity is guaranteed in the approach of Jang et al. [119], who employed a privacy-aware query authentication process.

5.2.5. Secure Computation

Users do not have full control over computations in distributed environments. This generates privacy and security concerns. For this reason, it is necessary to guarantee secure computations. In this regard, Matsumoto et al. [120] introduced the concept of server-aided computation. Their ultimate target was to use insecure auxiliary devices for speeding up private computations. Numerous server-aided computation protocols (e.g., [121]) are introduced. Girault and Lefranc [122] proposed the concept of server-aided verification for speeding up the process of authentication/signature verification by deploying a portion of computation to untrusted yet powerful servers. Later, a generic procedure achieved server-aided verification using bilinear maps.

5.2.6. Verifiable Computation

Verifiable computing offloads the computations to some other perhaps untrusted servers on the condition that results are verifiable and valid. In fog computing, the cloud offloads computations to the fog in distributed fashion. In addition, due to lack of computation resources, the users also approach fog nodes to submit computations for local processing. The fog is not completely trustworthy and may return incorrect results [8]. Thus, for the both cloud and the user, it is mandatory to check correctness of computed results or it may result in computation offloading failure. Gennaro et al. [123] designed a scheme of non-interactive computation and proposed the concept of verifiable computation. Using a small size of a public key, Chung et al. [124] applied homomorphic encryption schemes and constructed non-interactive verifiable computation scheme. Based on CP-ABE, Parno et al. [125] designed a scheme for publicly verifiable computation. To verify dynamic computation in the cloud environment, Papamanthou et al. [113] introduced a new model. Choi et al. [79] applied proxy oblivious transfer schemes to support multiple users laid down multi-user non-interactive verifiable computation scheme.

5.3. Device Level Security Challenges

In fog computing environments, each device has unique identity and visibility. Not all IoT devices are resourceful; many of them have constrained resources such as limited power, storage and computational capacities. Thus, they send their data to upper layer (fog/cloud as required) through gateways for processing, storage and provisioning of different services. Fog-based IoT systems bring significant privacy and security concerns [126]. The following crucial properties must be considered for securing the data produced at the device level, which are presented and outlined in Table 5.

5.3.1. Confidentiality

Confidentiality ensures that data are not exposed to an unauthorized entities. There is a great computation and storage overhead involved in existing security protocols such as SSL/TSL-based communication [127]. For example, it is not effective to apply existing PKI-based systems on all IoT devices due to their heavyweight computation and storage. The PKI and CIA protocols provide strong security in terms of fixed and predefined large sized keys, therefore causing memory and processing overhead. They also do not cater for insider attacks [128]. Cloud architecture does not meet IoT devices requirements such as timing, scalability and location awareness [129]. Therefore, lightweight infrastructure is crucial to provide a timely response.
  • Authentication: As fog computing services are offered to an enormous number of end users through front end fog nodes, authentication becomes a critical issue. Fog nodes require authentication at different levels to ensure security in fog computing, as explained by Stojmenovic et al. [102]. The existing conventional PKI-based authentication is unable to overcome the security issue being less efficient and with lower scalability options. On the other hand, there exist simple, user-friendly and secure solutions to cater the authentication issues in a location limited channel while depending on physical contact in local ad-hoc wireless network [130]. Moreover, biometric authentication has emerged as an important technology when it comes to authentication in mobile computing, cloud computing and fog computing. Fingerprint authentication, touch-based authentication or face authentication are few examples [98].
  • Privacy: Users are getting more concerned about the breaching to their private and sensitive information such as personal data, location or other information while using the cloud services, IoT or wireless networks. Therefore, it is the most crucial challenge to preserve the privacy in distributed fog environment, as the fog nodes operate at user’s end and must gather more sensitive data than the cloud. Several researchers have proposed various techniques to preserve the privacy in different setups such as wireless network, online social network [131], smart grid [132] and cloud [98,132].
    • Identity privacy: IoT user’s identity must be protected and preserved from public and other IoT user to prevent impersonation attacks. Different pseudonym techniques [133,134,135] have been proposed to preserve identity privacy. However, periodic pseudonyms may lead to heavy computation cost in resource constraint IoT domain. Furthermore, group signature [134] and connection anonymization [136,137,138] techniques are also proposed for protecting identity privacy [94].
    • Data privacy: The algorithms to preserve privacy in fog networks run between cloud and fog, but the fact that these algorithms utilize a huge amount of resources at the edge devices cannot be ignored. Fog nodes collect sensitive data that are generated through end devices and sensors [98]. At local gateways, homomorphic encryption can be employed without decryption to permit privacy-preserving collection [139]. Another technique that differential privacy [140] is employed in the case of statistical queries to ensure the privacy of uninformed data entries.
    • Usage privacy: Fog computing comes with another very important concern of users’ usage pattern privacy. For instance, the smart meter in smart grids reads and collects a huge amount of data that are private to users, such as at what times user is unavailable at home, the consumption pattern, switching on and off certain appliances, etc.; such information is a threat to users’ privacy. Many researchers addressed privacy preserving techniques in smart metering [141,142,143]. It is unfortunate that these techniques cannot be employed in fog computing because of unavailability of a trusted third-party device to cater energy limitations. One approach to preserve privacy is to create fake tasks by fog client and send them to other nodes; in this way, the real tasks are hidden behind fake ones. However, this solution is inefficient in terms of cost and energy consumption. Therefore, an effective approach is to design a solution that divides the application in a way that ensures the usage of distributed resources minimizes the disclosing private information [98].
    • Location privacy: The term location privacy denotes the privacy of the location of fog clients in fog computing. When a fog client divests the task to fog nodes, it assumes that those nodes are located nearby, and other nodes are distant, though this is not always the case. Moreover, the fog client may use several fog services at different locations, there are fair chances that the path trajectory may be disclosed to fog nodes. The location privacy is at risk as long as the fog client is attached to a person or device [98]. One way to hide the location of the fog clients is to obfuscate the fog client identity, so that even the fog node knows that client is nearby and still unable to locate it. Wei et al. [144] proposed several techniques to obfuscate the identity, one of which is to employ a trustworthy third party which may generate false identities for each fog client. In real scenarios, it is not necessary for a fog client to choose the nearest fog node, but even if it does so, the client may undergo some criteria such as reputation, latency or load balance to reach that node which may utilize more resources than usual. This can lead the node to have an idea of clients’ location but not in a precise manner. Gao et al. [145] proposed a method to preserve the privacy of client’s location in such situations.

5.3.2. Light-Weight Trust Management

The crux of fog-based IoT network is to endow secure and trustworthy services. There is a need to have certain trust levels among fog network devices. Authentication plays a crucial role in setting a trustful connection between fog nodes and IoT devices. It becomes indispensable to answer what if authenticated nodes behave maliciously such as provoking insider attacks. Conventional trust-based routing protocols have message overhead, high power consumption, require more memory and low trust convergence. Therefore, there is a need to design a trust-based mechanism that is lightweight with low processing, delay and memory consumption overhead and effective in identifying misbehaving nodes. Khan et al. [146] proposed a trust-based resilient routing mechanism for IoT which was not effective enough with bad/good mouthing attacks and supported only routing protocol for low power and lossy devices. A comprehensive trust-aware routing protocol with multi-attributes for WSNs was proposed by Sun and Li [101], which is characterized by complex calculation processes. For energy efficient trust-aware routing protocol for WSNs, [147] proposed several solutions influenced energy paths problems created by dishonest watcher, slow trust convergence and longer paths.

6. Blockchain: A Versatile Security Solution

The concept of blockchain was coined in 2008 [148] for bitcoin cryptocurrency network. Therefore, bitcoin is strongly supported by blockchain that is an unassailable log, which keeps record of network transactions. The blockchain incorporates a distributed ledger to accommodate each and every transaction of underlying network. Participants on network, manage blockchain in a distributed method by using variable Public Key (PK). The new records are added in blocks through a process called mining via certain nodes that are known as miners. The process of bitcoin mining comprises of Proof of Work (PoW), which is actually a cryptographic puzzle that consumes the enormous amount of resources.
Because of the key features of blockchain such as anonymity, decentralization and security, it is very useful technology to cater to the above-mentioned security and privacy problems in fog-enabled IoT systems in an easy, efficient, trustworthy and secured manner. In addition, it has been widely implemented for provision of authorized identity to IoT devices. The decentralization ability of blockchain ensures security, authentication and integrity of transmitted data by IoT devices to be cryptographically proofed, assigned by authentic sender using unique public key and GUID (Global Unique IDentifier). Blockchain has made easy the secure tracking of any IoT device transaction [149]. There are many domains such as (but not limited to) eHealth [150], smart home automation [151], authentication and secure communication [152], and data preserving and integrity [153] where blockchain has a remarkable impact, as shown in Table 6.
Another very useful feature of blockchain is smart contracts which provide effective rules to authenticate the IoT devices, with nominal complexity as compared to conventional protocols for authorization. Furthermore, smart contracts are also capable of providing privacy to data either in transit or at rest with already set rules and conditions to allow the access to single or multiple users. Furthermore, smart contracts are useful in sensing and averting malicious actions. The system refuses the breached blockchain updates of the device. It also eliminates centralized entity where devices do not need any centralized device for their secure communication. Instead, they can securely communicate with each other, share information and automatically perform executions with the help of smart contracts. Another advantage to implement blockchain is that it provides unique GUID and symmetric key pair to each IoT device connected to blockchain network which completely omits the process of key management and distribution. This simplifies the other security protocols as well, as there is no need left for exchanging PKI certificates or creating master and session keys for the purpose of encryption coding parameters at handshake phase. This way, feasibility of light-weight protocols increases as it would fit the memory resources requirement of IoT devices. In addition, it provides secure communication among devices that enable the verification of device’s identity validity and ensure verified cryptography of the transactions made by authentic user. Moreover, there is no single failure point as identical information is recorded on several computers and devices [126,154].
Apart from above-mentioned advantages, there are a few challenges associated with using blockchain in IoT domain [155,156]. In many instances of IoT devices, adaptive and lightweight blockchain security solutions are necessary due to constrained computational and storage capacities. The computations regarding PoW may be disregarded in this scenario. In addition, bitcoin blockchain also poses latency in terms of response time for transaction validation and hence is not suitable in real time domains. Moreover, as discussed above, IoT devices generate huge amount of data as the result of numerous transactions, which consumes colossal amount of bandwidth consequently. Even though blockchain allows anonymous transactions, Conoscenti et al. [156] discussed that pseudonyms still may be pursued. Furthermore, in consideration of IoT growth-rate, bitcoin blockchain will eventually face scalabilty issues. The blockchain is also prone to security hazards; the most common attacks are 51% and majority attacks [157,158].

Blockchain and Fog-Enabled IoT Systems

Fog-based IoT systems bring significant privacy and security concerns. The big data produced by a huge number of interconnected IoT device are sensitive and confidential. Thus, it is inevitable to provide end-to-end security and trust. The introduction of blockchain in fog-enabled IoT systems can solve such problems. The design of distributed fog services should be accompanied with state-of-the-art security systems that are capable of working autonomously in real time. As fog computing possess a distributed computing environment, it is impeccable to use distributed security mechanisms to secure network resources and data transactions, such as distributed trust and security solutions. Therefore, blockchain technology offers good grounds for fog-enabled IoT systems to build and manage distributed and decentralized trust and security solutions. The independent consensus among fog nodes and blockchain security architecture secure the network when the new device connects itself to the fog network. Furthermore, it can also detect and isolate the malfunctioning or compromised node to protect the whole system from any security breach. Therefore, this provides the much needed self-healing capability to the fog-enabled IoT systems. For complete success of IoT systems, it needs a new and efficient mechanism of security as the traditional security system and mechanism are unable to cope the challenges posed to this architecture. Therefore, industrial cyber-security systems should come with data securing mechanism to protect big data along with active corporation and control among connected devices [164,165].
Moreover, all the fog-enabled IoT applications store large quantity of data for different purposes, such as enterprises store data related to their customers for observing their trends related to their specific interest which causes the privacy concerns. Among this, most of the issues arise due to intervention of third-party apps and services. Blockchain systems can provide highest possible security measures in this regard. The most important feature of blockchain is the introduction of secure storage and transmission by digitally signed documents for enhanced protection and privacy. Moreover, this technology may possibly offer an effortless infrastructure to directly transfer data among IoT devices for secure communication through a reliable time-stamped contractual handshake. These applications are widely used in trade and finance departments due to their sensitive nature for identity validation of users [166]. There exists some state-of-the-art systems in IoT domain [151,167,168,169]. For the smart city, Sharma and Park [170] proposed a hybrid network architecture combined with Software Defined Networking (SDN) and blockchain. The authors also proposed a blockchain based scheme for distributed vehicular networks in [171]. In [159], they used SDN and blockchain technology for IoT based transport management system using a distributed mesh network infrastructure. For big data, BigchainDB [158] was used for increased throughput and to cater latency issues with the help of decentralized blockchain system. A literature review on applications of blockchain is presented in [156], mentioning the usability of blockchain in IoT domains. The authors also highlighted integrity and adaptability issues of blockchain in IoT systems. Samaniego and Deters [172] compared both cloud and fog platforms to justify which performs better for blockchain based IoT networks. According to their findings, the fog-based scenarios outperform the cloud-based IoT systems.
The security system equipped with blockchain-based security satisfies all the requirements of fog-enabled IoT systems by enhancing independent operation between all the connected nodes. It provides all the required qualities such as distribution and heterogeneity, which is the same as thos provided by the blockchain-based systems. However, fog applications are not supported by all blockchain consensus mechanisms, for instance Proof of Work (PoW) cannot be hosted on fog devices as it demands enormous resources such as power and computing to execute transactions. The OpenFog Consortium [164] aims at expeditious fog computing adoption and interoperability with the blockchain technology.

7. Conclusions

Due to lack in hardware/software security designs and constrained resources, IoT devices are vulnerable to different security attacks. This paper discusses potential security and privacy challenges in fog-enabled IoT system. The main goal of this work is to provide insight on securing big data generated by fog-enabled IoT applications. We started with different IoT applications that generate massive amount of data followed by fog computing architecture, fog-enabled IoT applications security requirements and fog computing security challenges. We studied different existing state-of-the-art security and privacy approaches to map these challenges along with their limitations. In addition, we also considered the blockchain as an emerging security solution along with the potential benefits to address security issues in fog-enabled IoT domain accompanied by some existing blockchain solutions in IoT systems.
Pursuant to our study and findings, we suggest that existing cryptographic and PKI mechanisms are not appropriate and suitable for resource constraint IoT devices such as sensor tags. There should be efficient security mechanisms that do not exhaust such devices in terms of computation, storage and energy. The blockchain is a decentralized security mechanism, which ensures security, authentication and integrity of transmitted data by IoT devices to be cryptographically proofed. It also provides features such as anonymity; it is a useful technology to cater to security and privacy problems in IoT in an easy and efficient way. Although blockchain provides many advantages, there should be efficient lightweight blockchain security proposals that do not exhaust resource constrained IoT devices in terms of computation, storage and energy.
References

Author Contributions

N.T., and M.A. conceptualized and presented the idea. N.T., M.A., F.A.-O., and M.Z.F. developed the theoretical analysis. F.A.-O., T.B., M.H., and I.G. supervised the findings of this research. N.T. took the lead in writing the manuscript with participation of M.A. and M.Z.F. All authors provided critical feedback and help shaping the research, results discussion and contributed to the final manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zio, E. Critical Infrastructures Vulnerability and Risk Analysis. Eur. J. Secur. Res. 2016, 1, 97–114. [Google Scholar] [CrossRef]
  2. Baker, T.; Asim, M.; MacDermott, Á.; Iqbal, F.; Kamoun, F.; Shah, B.; Alfandi, O.; Hammoudeh, M. A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 2019. [Google Scholar] [CrossRef]
  3. Georgakopoulos, D.; Jayaraman, P.; Fazia, M.; Villari, M.; Ranjan, R. Internet of Things and Edge Cloud Computing Roadmap for Manufacturing. IEEE Cloud Comput. 2016, 4, 66–73. [Google Scholar] [CrossRef]
  4. Sajid, A.; Abbas, H.; Saleem, K. Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Acc. 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
  5. Kröger, W. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliab. Eng. Syst. Saf. 2008, 93, 1781–1787. [Google Scholar] [CrossRef]
  6. Granic, I.; Lamey, A.V. The self-organization of the Internet and changing modes of thought. New Ideas Psychol. 2000, 18, 93–107. [Google Scholar] [CrossRef]
  7. Kelly, D.; Hammoudeh, M. Optimisation of the public key encryption infrastructure for the internet of things. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, 26–27 June 2018; p. 45. [Google Scholar]
  8. Ni, J.; Zhang, K.; Lin, X.; Shen, X. Securing fog computing for internet of things applications: Challenges and solutions. IEEE Commun. Surv. Tutor. 2017, 20, 601–628. [Google Scholar] [CrossRef]
  9. Abbas, N.; Asim, M.; Tariq, N.; Baker, T.; Abbas, S. A Mechanism for Securing IoT-enabled Applications at the Fog Layer. J. Sens. Actuator Netw. 2019, 8, 16. [Google Scholar] [CrossRef]
  10. Networking, C.V. Cisco Global Cloud Index: Forecast and Methodology, 2014–2019; White Paper; Cisco: San Jose, CA, USA, 2013. [Google Scholar]
  11. Zeng, X.; Garg, S.; Strazdins, P.; Jayaraman, P.; Georgakopoulos, D.; Ranjan, R. IOTSim: A simulator for analysing IoT applications. J. Syst. Archit. 2017, 72, 93–107. [Google Scholar] [CrossRef]
  12. Ma, Y.; Wang, L.; Liu, P.; Ranjan, R. Towards building a data-intensive index for big data computing—A case study of Remote Sensing data processing. Inf. Sci. 2015, 319, 171–188. [Google Scholar] [CrossRef]
  13. Pàmies-Estrems, D.; Kaaniche, N.; Laurent, M.; Castellà-Roca, J.; Garcia-Alfaro, J. Lifelogging protection scheme for internet-based personal assistants. In Data Privacy Management, Cryptocurrencies and Blockchain Technology; Springer: Berlin, Germany, 2018; pp. 431–440. [Google Scholar]
  14. Liang, K.; Zhao, L.; Chu, X.; Chen, H.H. An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Netw. 2017, 31, 80–87. [Google Scholar] [CrossRef]
  15. Almeida, V.A.; Doneda, D.; Monteiro, M. Governance challenges for the Internet of Things. IEEE Internet Comput. 2015, 19, 56–59. [Google Scholar] [CrossRef]
  16. Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
  17. Granjal, J.; Monteiro, E.; Silva, J.S. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
  18. Zhang, K.; Liang, X.; Lu, R.; Yang, K.; Shen, X.S. Exploiting mobile social behaviors for sybil detection. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 271–279. [Google Scholar]
  19. Zhou, J.; Cao, Z.; Dong, X.; Lin, X.; Vasilakos, A.V. Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wirel. Commun. 2013, 20, 12–21. [Google Scholar] [CrossRef]
  20. Lyu, L.; Jin, J.; Rajasegarar, S.; He, X.; Palaniswami, M. Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering. IEEE Internet Things J. 2017, 4, 1174–1184. [Google Scholar] [CrossRef]
  21. Ghafir, I.; Prenosil, V.; Hammoudeh, M.; Baker, T.; Jabbar, S.; Khalid, S.; Jaf, S. BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Acc. 2018, 6, 38947–38958. [Google Scholar] [CrossRef]
  22. Nepal, S.; Ranjan, R.; Choo, K.K.R. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. IEEE Cloud Comput. 2015, 2, 78–84. [Google Scholar] [CrossRef]
  23. Luong, N.C.; Hoang, D.T.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Commun. Surv. Tutor. 2016, 18, 2546–2590. [Google Scholar] [CrossRef]
  24. Farahani, B.; Firouzi, F.; Chang, V.; Badaroglu, M.; Constant, N.; Mankodiya, K. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst. 2018, 78, 659–676. [Google Scholar] [CrossRef]
  25. Ni, J.; Lin, X.; Zhang, K.; Yu, Y.; Shen, X.S. Device-invisible two-factor authenticated key agreement protocol for BYOD. In Proceedings of the 2016 IEEE/CIC International Conference on Communications in China (ICCC), Chengdu, China, 27–29 July 2016; pp. 1–6. [Google Scholar]
  26. Jogunola, O.; Ikpehai, A.; Anoh, K.; Adebisi, B.; Hammoudeh, M.; Son, S.Y.; Harris, G. State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System. Energies 2017, 10, 2106. [Google Scholar] [CrossRef]
  27. Vieira, K.; Schulter, A.; Westphall, C.; Westphall, C. Intrusion detection for grid and cloud computing. It Prof. 2010, 12, 38–43. [Google Scholar] [CrossRef]
  28. Jogunola, O.; Ikpehai, A.; Anoh, K.; Adebisi, B.; Hammoudeh, M.; Gacanin, H.; Harris, G. Comparative Analysis of P2P Architectures for Energy Trading and Sharing. Energies 2018, 11, 62. [Google Scholar] [CrossRef]
  29. Byers, C.C. Architectural imperatives for fog computing: Use cases, requirements, and architectural techniques for fog-enabled iot networks. IEEE Commun. Mag. 2017, 55, 14–20. [Google Scholar] [CrossRef]
  30. Mushunuri, V.; Kattepur, A.; Rath, H.K.; Simha, A. Resource optimization in fog enabled IoT deployments. In Proceedings of the 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, Spain, 8–11 May 2017; pp. 6–13. [Google Scholar]
  31. Charalampidis, P.; Tragos, E.; Fragkiadakis, A. A fog-enabled IoT platform for efficient management and data collection. In Proceedings of the 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Lund, Sweden, 19–21 June 2017; pp. 1–6. [Google Scholar]
  32. Azimi, I.; Anzanpour, A.; Rahmani, A.M.; Pahikkala, T.; Levorato, M.; Liljeberg, P.; Dutt, N. HiCH: Hierarchical fog-assisted computing architecture for healthcare IoT. ACM Trans. Embed. Comput. Syst. (TECS) 2017, 16, 174. [Google Scholar] [CrossRef]
  33. Gazis, V. A Survey of Standards for Machine-to-Machine and the Internet of Things. IEEE Commun. Surv. Tutor. 2017, 19, 482–511. [Google Scholar] [CrossRef]
  34. Kim, J.T. Requirement of security for IoT application based on gateway system. Communications 2015, 9, 201–208. [Google Scholar] [CrossRef]
  35. Agustin, J.P.C.; Jacinto, J.H.; Limjoco, W.J.R.; Pedrasa, J.R.I. IPv6 routing protocol for low-power and lossy networks implementation in network simulator—3. In Proceedings of the TENCON 2017-2017 IEEE Region 10 Conference, Penang, Malaysia, 5–8 November 2017; pp. 3129–3134. [Google Scholar]
  36. Baig, Z.A.; Szewczyk, P.; Valli, C.; Rabadia, P.; Hannay, P.; Chernyshev, M.; Johnstone, M.; Kerai, P.; Ibrahim, A.; Sansurooah, K.; et al. Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 2017, 22, 3–13. [Google Scholar] [CrossRef]
  37. Liu, C.; Qiu, J. Study on a Secure Wireless Data Communication in Internet of Things Applications. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 2015, 15, 18. [Google Scholar]
  38. Chandrasekhar, S.; Singhal, M. Efficient and scalable query authentication for cloud-based storage systems with multiple data sources. IEEE Trans. Serv. Comput. 2017, 10, 520–533. [Google Scholar] [CrossRef]
  39. Daneva, M.; Lazarov, B. Requirements for smart cities: Results from a systematic review of literature. In Proceedings of the 2018 12th International Conference on Research Challenges in Information Science (RCIS), Nantes, France, 29–31 May 2018; pp. 1–6. [Google Scholar]
  40. Hui, T.K.; Sherratt, R.S.; Sánchez, D.D. Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies. Future Gener. Comput. Syst. 2017, 76, 358–369. [Google Scholar] [CrossRef]
  41. Khan, Z.; Pervez, Z.; Abbasi, A.G. Towards a secure service provisioning framework in a smart city environment. Future Gener. Comput. Syst. 2017, 77, 112–135. [Google Scholar] [CrossRef]
  42. Sundaravadivel, P.; Kougianos, E.; Mohanty, S.P.; Ganapathiraju, M.K. Everything you wanted to know about smart health care: Evaluating the different technologies and components of the internet of things for better health. IEEE Consum. Electron. Mag. 2018, 7, 18–28. [Google Scholar] [CrossRef]
  43. Terzi, D.S.; Arslan, B.; Sagiroglu, S. Smart grid security evaluation with a big data use case. In Proceedings of the 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018), Doha, Qatar, 10–12 April 2018; pp. 1–6. [Google Scholar]
  44. Wu, F.; Xu, L.; Kumari, S.; Li, X.; Shen, J.; Choo, K.K.R.; Wazid, M.; Das, A.K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 2017, 89, 72–85. [Google Scholar] [CrossRef]
  45. Hussain, R.; Abdullah, I. Review of Different Encryptionand Decryption Techniques Used for Security and Privacy of IoT in Different Applications. In Proceedings of the 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–15 August 2018; pp. 293–297. [Google Scholar]
  46. Arış, A.; Oktuğ, S.F.; Voigt, T. Security of Internet of Things for a Reliable Internet of Services. In Autonomous Control for a Reliable Internet of Services; Springer: Berlin, Germany, 2018; pp. 337–370. [Google Scholar]
  47. Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet Things J. 2018, 6, 379–387. [Google Scholar] [CrossRef]
  48. Fadele, A.A.; Othman, M.; Hashem, I.A.T.; Yaqoob, I.; Imran, M.; Shoaib, M. A novel countermeasure technique for reactive jamming attack in internet of things. Multimed. Tools Appl. 2018, 1–22. [Google Scholar] [CrossRef]
  49. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
  50. Liang, L.; Zheng, K.; Sheng, Q.; Wang, W.; Fu, R.; Huang, X. A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. In Proceedings of the International Conference on Network and System Security, Hong Kong, China, 27–29 August 2017; pp. 613–622. [Google Scholar]
  51. Amin, R.; Kumar, N.; Biswas, G.; Iqbal, R.; Chang, V. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Gener. Comput. Syst. 2018, 78, 1005–1019. [Google Scholar] [CrossRef]
  52. Lin, X.; Ni, J.; Shen, X.S. Summary and Future Directions. In Privacy-Enhancing Fog Computing and Its Applications; Springer: Berlin, Germany, 2018; pp. 87–89. [Google Scholar]
  53. Giri, D.; Borah, S.; Pradhan, R. Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey. In Advances in Communication, Devices and Networking; Springer: Berlin, Germany, 2018; pp. 855–864. [Google Scholar]
  54. Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2018, 93, 860–876. [Google Scholar] [CrossRef]
  55. Huang, C.; Liu, D.; Ni, J.; Lu, R.; Shen, X. Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  56. Singh, C.R. Analysis of Router Poisoning using network attacks. Int. Res. J. Eng. Technol. (IRJET) 2018, 5, 775–780. [Google Scholar]
  57. Zarpelão, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [Google Scholar] [CrossRef]
  58. Jain, A.; Jain, S. A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT. In Emerging Technologies in Data Mining and Information Security; Springer: Berlin, Germany, 2019; pp. 611–620. [Google Scholar]
  59. Aman, M.N.; Sikdar, B.; Chua, K.C.; Ali, A. Low Power Data Integrity in IoT Systems. IEEE Internet Things J. 2018, 5, 3102–3113. [Google Scholar] [CrossRef]
  60. Lu, Y.; Da Xu, L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2018. [Google Scholar] [CrossRef]
  61. Zhang, P.; Nagarajan, S.G.; Nevat, I. Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things. IEEE Internet Things J. 2017, 4, 2199–2206. [Google Scholar] [CrossRef]
  62. Park, J.H.; Kim, H.J.; Sung, M.H.; Lee, D.H. Public key broadcast encryption schemes with shorter transmissions. IEEE Trans. Broadcast. 2008, 54, 401–411. [Google Scholar] [CrossRef]
  63. Quercia, D.; Hailes, S. Sybil attacks against mobile users: Friends and foes to the rescue. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–5. [Google Scholar]
  64. Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 2017, 21, 34–42. [Google Scholar] [CrossRef]
  65. Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and privacy in fog computing: Challenges. IEEE Acc. 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
  66. Svoboda, J.; Ghafir, I.; Prenosil, V. Network monitoring approaches: An overview. Int. J. Adv. Comput. Netw. Secur. 2015, 5, 88–93. [Google Scholar]
  67. Choo, K.K.R. Cloud computing: Challenges and future directions. In Trends and Issues in Crime and Criminal Justice; Australian Institute of Criminology: Canberra, Australia, 2010; p. 1. [Google Scholar]
  68. Landau, S. Highlights from making sense of Snowden, part II: What’s significant in the NSA revelations. IEEE Secur. Priv. 2014, 12, 62–64. [Google Scholar] [CrossRef]
  69. Yi, S.; Li, C.; Li, Q. A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, 21 June 2015; pp. 37–42. [Google Scholar]
  70. Hao, Z.; Tang, Y.; Zhang, Y.; Novak, E.; Carter, N.; Li, Q. SMOC: A secure mobile cloud computing platform. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 2668–2676. [Google Scholar]
  71. Thota, C.; Sundarasekar, R.; Manogaran, G.; Varatharajan, R.; Priyan, M. Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog Computing: Breakthroughs in Research and Practice; IGI Global: Hershey, PA, USA, 2018; pp. 365–378. [Google Scholar]
  72. Mandlekar, V.G.; Mahale, V.; Sancheti, S.S.; Rais, M.S. Survey on Fog Computing Mitigating Data Theft Attacks in Cloud. Int. J. Innov. Res. Comput. Sci. Technol. 2014, 2, 13–16. [Google Scholar]
  73. Sandhu, R.; Sohal, A.S.; Sood, S.K. Identification of malicious edge devices in fog computing environments. Inf. Secur. J. Glob. Perspect. 2017, 26, 213–228. [Google Scholar] [CrossRef]
  74. Zhang, T.; Antunes, H.; Aggarwal, S. Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet Things J. 2014, 1, 10–21. [Google Scholar] [CrossRef]
  75. Chiang, M.; Zhang, T. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 2016, 3, 854–864. [Google Scholar] [CrossRef]
  76. Li, C.; Qin, Z.; Novak, E.; Li, Q. Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks. IEEE Internet Things J. 2017, 4, 1156–1164. [Google Scholar] [CrossRef]
  77. Blaze, M.; Bleumer, G.; Strauss, M. Divertible Protocols and Atomic Proxy Cryptography; Springer: Berlin, Germany, 1998; pp. 127–144. [Google Scholar]
  78. van Dijk, M.; Gentry, C.; Halevi, S.; Vaikuntanathan, V. Fully Homomorphic Encryption over the Integers. In Advances in Cryptology—EUROCRYPT 2010; Gilbert, H., Ed.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 24–43. [Google Scholar]
  79. Choi, S.G.; Katz, J.; Kumaresan, R.; Cid, C. Multi-client non-interactive verifiable computation. In Theory of Cryptography; Springer: Berlin, Germany, 2013; pp. 499–518. [Google Scholar]
  80. Salonikias, S.; Mavridis, I.; Gritzalis, D. Access control issues in utilizing fog computing for transport infrastructure. In Proceedings of the International Conference on Critical Information Infrastructures Security, Berlin, Germany, 5–7 October 2015; pp. 15–26. [Google Scholar]
  81. Smart, N.P.; Vercauteren, F. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Proceedings of the International Workshop on Public Key Cryptography, Paris, France, 26–28 May 2010; pp. 420–443. [Google Scholar]
  82. Belguith, S.; Kaaniche, N.; Laurent, M.; Jemai, A.; Attia, R. Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput. Netw. 2018, 133, 141–156. [Google Scholar] [CrossRef]
  83. Belguith, S.; Kaaniche, N.; Russello, G. Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications-Volume 1: SECRYPT, Porto, Portugal, 26–28 July 2018; pp. 135–146. [Google Scholar]
  84. Final Lightweight Cryptography Status Report, European Network of Excellence in Cryptology II D.SYM.12. 2012. Available online: http://www.ecrypt.eu.org/ecrypt2/documents/D.SYM.12.pdf (accessed on 5 December 2018).
  85. Arshad, J.; Townend, P.; Xu, J. An abstract model for integrated intrusion detection and severity analysis for clouds. Int. J. Cloud Appl. Comput. (IJCAC) 2011, 1, 1–16. [Google Scholar] [CrossRef]
  86. Hamad, H.; Al-Hoby, M. Managing intrusion detection as a service in cloud networks. Int. J. Comput. Appl. 2012, 41. [Google Scholar] [CrossRef]
  87. Houmansadr, A.; Zonouz, S.A.; Berthier, R. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, 27–30 June 2011; pp. 31–32. [Google Scholar]
  88. Jain, A.K.; Tokekar, V.; Shrivastava, S. Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks. In Information and Communication Technology; Springer: Berlin, Germany, 2018; pp. 39–47. [Google Scholar]
  89. Liang, X.; Lin, X.; Shen, X.S. Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 310–320. [Google Scholar] [CrossRef]
  90. Yu, H.; Shen, Z.; Leung, C.; Miao, C.; Lesser, V.R. A survey of multi-agent trust management systems. IEEE Acc. 2013, 1, 35–50. [Google Scholar]
  91. Nitti, M.; Girau, R.; Atzori, L. Trustworthiness Management in the Social Internet of Things. IEEE Trans. Knowl. Data Eng. 2014, 26, 1253–1266. [Google Scholar] [CrossRef]
  92. Wei, Z.; Tang, H.; Yu, F.R.; Wang, M.; Mason, P. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 2014, 63, 4647–4658. [Google Scholar] [CrossRef]
  93. Su, Z.; Biennier, F.; Lv, Z.; Peng, Y.; Song, H.; Miao, J. Toward architectural and protocol-level foundation for end-to-end trustworthiness in Cloud/Fog computing. IEEE Trans. Big Data 2017. [Google Scholar] [CrossRef]
  94. Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
  95. Canetti, R.; Hohenberger, S. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October–2 November 2007; pp. 185–194. [Google Scholar]
  96. Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; pp. 457–473. [Google Scholar]
  97. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
  98. Yi, S.; Qin, Z.; Li, Q. Security and privacy issues of fog computing: A survey. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Qufu, China, 10–12 August 2015; pp. 685–695. [Google Scholar]
  99. Klaedtke, F.; Karame, G.O.; Bifulco, R.; Cui, H. Access control for SDN controllers. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, IL, USA, 22 August 2014; pp. 219–220. [Google Scholar]
  100. Aravazhi, A.; Sarathi, P. Secure Routing In Wireless Sensor Networks Via Pomdps. In Proceedings of the IJCAI, Stockholm, Sweden, 13–19 July 2018; pp. 2617–2623. [Google Scholar]
  101. Sun, B.; Li, D. A Comprehensive Trust-Aware Routing Protocol with Multi-Attributes for WSNs. IEEE Acc. 2018, 6, 4725–4741. [Google Scholar] [CrossRef]
  102. Stojmenovic, I.; Wen, S. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
  103. Ghafir, I.; Prenosil, V. Malicious file hash detection and drive-by download attacks. In Proceedings of the Second International Conference on Computer and Communication Technologies; Springer: Berlin, Germany, 2016; pp. 661–669. [Google Scholar]
  104. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238. [Google Scholar]
  105. Boneh, D.; Goh, E.J.; Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; pp. 325–341. [Google Scholar]
  106. Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Acc. 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
  107. Rizomiliotis, P.; Gritzalis, S. ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes. In Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, Denver, CO, USA, 16 October 2015; ACM: New York, NY, USA, 2015; pp. 65–76. [Google Scholar]
  108. Naveed, M.; Prabhakaran, M.; Gunter, C.A. Dynamic searchable encryption via blind storage. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 18–21 May 2014; pp. 639–654. [Google Scholar]
  109. Yang, X.; Yin, F.; Tang, X. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service. Sensors 2017, 17, 1611. [Google Scholar] [CrossRef]
  110. Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public key encryption with keyword search. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; pp. 506–522. [Google Scholar]
  111. Iovino, V.; Persiano, G. Hidden-vector encryption with groups of prime order. In Proceedings of the International Conference on Pairing-Based Cryptography, Egham, UK, 1–3 September 2008; pp. 75–88. [Google Scholar]
  112. Czerwinski, S.E.; Zhao, B.Y.; Hodes, T.D.; Joseph, A.D.; Katz, R.H. An architecture for a secure service discovery service. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, WA, USA, 15–19 August 1999; pp. 24–35. [Google Scholar]
  113. Papamanthou, C.; Shi, E.; Tamassia, R. Signatures of correct computation. In Theory of Cryptography; Springer: Berlin, Germany, 2013; pp. 222–242. [Google Scholar]
  114. Bello-Orgaz, G.; Jung, J.J.; Camacho, D. Social big data: Recent achievements and new challenges. Inf. Fusion 2016, 28, 45–59. [Google Scholar] [CrossRef]
  115. Gahi, Y.; Guennoun, M.; Mouftah, H.T. Big data analytics: Security and privacy challenges. In Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 952–957. [Google Scholar]
  116. Li, L.; Lu, R.; Choo, K.K.R.; Datta, A.; Shao, J. Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1847–1861. [Google Scholar] [CrossRef]
  117. Xu, L.; Wu, X.; Zhang, X. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Korea, 2–4 May 2012; pp. 87–88. [Google Scholar]
  118. Kim, H.I.; Hong, S.; Chang, J.W. Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl. Eng. 2016, 104, 32–44. [Google Scholar] [CrossRef]
  119. Jang, M.; Yoon, M.; Chang, J.W. A privacy-aware query authentication index for database outsourcing. In Proceedings of the 2014 International Conference on Big Data and Smart Computing (BIGCOMP), Bangkok, Thailand, 15–17 January 2014; pp. 72–76. [Google Scholar]
  120. Matsumoto, T.; Kato, K.; Imai, H. Speeding up secret computations with insecure auxiliary devices. In Proceedings on Advances in Cryptology; Springer: New York, NY, USA, 1990; pp. 497–506. [Google Scholar]
  121. Cavallo, B.; Di Crescenzo, G.; Kahrobaei, D.; Shpilrain, V. Efficient and secure delegation of group exponentiation to a single server. In Proceedings of the International Workshop on Radio Frequency Identification: Security and Privacy Issues, New York, NY, USA, 23–24 June 2015; pp. 156–173. [Google Scholar]
  122. Girault, M.; Lefranc, D. Server-aided verification: Theory and practice. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, 4–8 December 2005; pp. 605–623. [Google Scholar]
  123. Gennaro, R.; Gentry, C.; Parno, B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2010; pp. 465–482. [Google Scholar]
  124. Chung, K.M.; Kalai, Y.; Vadhan, S. Improved delegation of computation using fully homomorphic encryption. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2010; pp. 483–501. [Google Scholar]
  125. Parno, B.; Raykova, M.; Vaikuntanathan, V. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In Proceedings of the Theory of Cryptography Conference, Tokyo, Japan, 3–6 March 2012; pp. 422–439. [Google Scholar]
  126. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  127. Ghafir, I.; Prenosil, V.; Hammoudeh, M.; Han, L.; Raza, U. Malicious ssl certificate detection: A step towards advanced persistent threat defence. In Proceedings of the International Conference on Future Networks and Distributed Systems, Cambridge, UK, 19–20 July 2017; p. 27. [Google Scholar]
  128. Walker-Roberts, S.; Hammoudeh, M.; Dehghantanha, A. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Acc. 2018, 6, 25167–25177. [Google Scholar] [CrossRef]
  129. Diro, A.A.; Chilamkurti, N.; Kumar, N. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography In Publish-Subscribe Fog Computing. Mob. Netw. Appl. 2017, 22, 848–858. [Google Scholar] [CrossRef]
  130. Balfanz, D.; Smetters, D.K.; Stewart, P.; Wong, H.C. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In NDSS; Citeseer: University Park, PA, USA, 2002. [Google Scholar]
  131. McLaughlin, S.; McDaniel, P.; Aiello, W. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 17–21 October 2011; pp. 87–98. [Google Scholar]
  132. Qin, Z.; Yi, S.; Li, Q.; Zamkov, D. Preserving secondary users’ privacy in cognitive radio networks. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, USA, 27 April–2 May 2014; pp. 772–780. [Google Scholar]
  133. Lin, X.; Sun, X.; Wang, X.; Zhang, C.; Ho, P.H.; Shen, X. TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 2008, 7, 4987–4998. [Google Scholar] [CrossRef]
  134. Lin, X.; Li, X. Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2013, 62, 3339–3348. [Google Scholar]
  135. Zhu, H.; Lin, X.; Lu, R.; Fan, Y.; Shen, X. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 2009, 58, 4628–4639. [Google Scholar]
  136. Sen, J. Privacy preservation technologies in Internet of Things. arXiv preprint 2010, arXiv:1012.2177. [Google Scholar]
  137. Ghafir, I.; Svoboda, J.; Prenosil, V. Tor-based malware and Tor connection detection. In Proceedings of the International Conference on Frontiers of Communications, Networks and Applications, Kuala Lumpur, Malaysia, 3–5 November 2014; pp. 1–6. [Google Scholar]
  138. Lu, R.; Lin, X.; Zhu, H.; Shen, X.; Preiss, B. Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 2010, 9, 1483–1493. [Google Scholar] [CrossRef]
  139. Lu, R.; Liang, X.; Li, X.; Lin, X.; Shen, X. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1621–1631. [Google Scholar]
  140. Dwork, C.; van Tilborg, H.; Jajodia, S. Differential Privacy. In Encyclopedia of Cryptography and Security; Springer: Berlin, Germany, 2011. [Google Scholar]
  141. Novak, E.; Li, Q. Near-pri: Private, proximity based location sharing. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, USA, 27 April–2 May 2014; pp. 37–45. [Google Scholar]
  142. Chu, S.M.; Gong, M.; Li, D.S.; Yan, J.C.; Zhang, W.P. Privacy-Preserving Smart Metering. U.S. Patent App. 15/249,564, 1 March 2018. [Google Scholar]
  143. Rial, A.; Danezis, G. Privacy-preserving smart metering. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, IL, USA, 17 October 2011; pp. 49–60. [Google Scholar]
  144. Wei, W.; Xu, F.; Li, Q. Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2616–2620. [Google Scholar]
  145. Gao, Z.; Zhu, H.; Liu, Y.; Li, M.; Cao, Z. Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2751–2759. [Google Scholar]
  146. Khan, Z.A.; Ullrich, J.; Voyiatzis, A.G.; Herrmann, P. A Trust-Based Resilient Routing Mechanism for The Internet of Things. In Proceedings of the 12th International Conference on Availability, Reliability And Security—ARES ’17, Reggio Calabria, Italy, 29 August–1 September 2017. [Google Scholar] [CrossRef]
  147. Gong, P.; Chen, T.M.; Xu, Q. ETARP: An Energy Efficient Trust-Aware Routing Protocol For Wireless Sensor Networks. J. Sens. 2015, 1–10. [Google Scholar] [CrossRef]
  148. Outchakoucht, A.; Hamza, E.S.; Leory, J.P. Dynamic access control policy based on blockchain and machine learning for the internet of things. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2017, 8, 417–424. [Google Scholar] [CrossRef]
  149. Dorri, A.; Kanhere, S.S.; Jurdak, R. Towards an optimized blockchain for IoT. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, Pittsburgh, PA, USA, 18–21 April 2017; pp. 173–178. [Google Scholar]
  150. Yue, X.; Wang, H.; Jin, D.; Li, M.; Jiang, W. Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 2016, 40, 218. [Google Scholar] [CrossRef]
  151. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar]
  152. Hammi, M.T.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of Trust: A decentralized Blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar] [CrossRef]
  153. Javaid, U.; Aman, M.N.; Sikdar, B. BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments. In Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, Shenzhen, China, 4–7 November 2018; pp. 13–18. [Google Scholar]
  154. Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef]
  155. Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef]
  156. Conoscenti, M.; Vetro, A.; De Martin, J.C. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar]
  157. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  158. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  159. Sharma, P.K.; Singh, S.; Jeong, Y.S.; Park, J.H. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Commun. Mag. 2017, 55, 78–85. [Google Scholar] [CrossRef]
  160. Brambilla, G.; Amoretti, M.; Zanichelli, F. Using Blockchain for Peer-to-Peer Proof-of-Location. arXiv 2016, arXiv:1607.00174. [Google Scholar]
  161. Hardjono, T.; Smith, N. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Xi’an, China, 30 May 2016; pp. 29–36. [Google Scholar]
  162. Nguyen, T.D.; Pham, H.A.; Thai, M.T. Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications. In Proceedings of the International Conference on Computational Social Networks, Paris, France, 29–30 October 2018; pp. 211–221. [Google Scholar]
  163. Mendez Mena, D.M.; Yang, B. Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks. In Proceedings of the 19th Annual SIG Conference on Information Technology Education. International World Wide Web Conferences Steering Committee, Lyon, France, 23–27 April 2018; pp. 7–12. [Google Scholar]
  164. Available online: https://blogs.cisco.com/innovation/blockchain-and-fog-made-for-each-other (accessed on 19 December 2018).
  165. Available online: http://www.embedded-computing.com/iot/redesigning-security-for-fog-computing-with-blockchain (accessed on 18 March 2019).
  166. Mainelli, M. Blockchain will help us prove our identities in a digital world. Harv. Bus. Rev. 2017. [Google Scholar]
  167. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
  168. Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Acc. 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  169. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3690–3700. [Google Scholar] [CrossRef]
  170. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
  171. Sharma, P.K.; Moon, S.Y.; Park, J.H. Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City. JIPS 2017, 13, 184–195. [Google Scholar]
  172. Samaniego, M.; Deters, R. Blockchain as a Service for IoT. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 433–436. [Google Scholar]
Figure 1. Data intensive IoT applications.
Figure 1. Data intensive IoT applications.
Sensors 19 01788 g001
Figure 2. Fog-enabled IoT systems.
Figure 2. Fog-enabled IoT systems.
Sensors 19 01788 g002
Figure 3. Functionality-based fog architecture.
Figure 3. Functionality-based fog architecture.
Sensors 19 01788 g003
Figure 4. Taxonomy of IoT-based fog security challenges.
Figure 4. Taxonomy of IoT-based fog security challenges.
Sensors 19 01788 g004
Table 1. Security and privacy threats in IoT-enabled applications.
Table 1. Security and privacy threats in IoT-enabled applications.
ThreatDescription
Forgery [44]Fake identities and profiles, fake information to mislead the user. Saturate resource consumption through fake data. That is,  in E-Health and home automation systems, one can easily fake their identifications and profiles to generate any attack.
Tampering [45]Degrading the efficiency of fog by dropping/delaying transmitting data. That is,  energy conservation systems are responsible to collect the data related to electricity supply, consumption patterns, smart metering, pricing and other details. As the data are very critical, dropping or delaying the data may cause problems.
Spamming [46]Spreading redundant information which causes to consume resources unnecessarily. The attack generated on smart cities lies in this domain.
Sybil [47]Legitimate user personal information and manipulation of fake identities to take over the illegal control on fog resources. That is,  in smart home and smart cities, legitimate user can manipulate the fake identities to take control of the network.
Jamming [48]Jam communication network by spreading burst if dummy data on the network. Any type of smart environment can be attacked by Jamming.
Eavesdropping [49]Capturing of transmitting packets and try to read the contents. Any type of smart environment can be a victim of these attacks.
DoS [50]Flooding of superfluous requests to fog nodes to disrupt the services for users. The data generated by smart cities and smart agriculture can be a victim of DoS and flooding attacks.
CollusionAcquiring unfair advantage through deceiving, misleading and defrauding legal entities by collusion of two or more parties.
Man-In-The-Middle [50]Involving between two parties and manipulate exchanged data between them.  E-Health and Smart cities are the best fit examples.
Impersonation [51]Pretending the fake services as fog services to the users.
Identity Privacy [52]User personal information leakage such as phone number, visa number, etc. on a communication channel.
Data Privacy [52]Exposure of user data to unreliable parties considerably reaches to privacy leakage. Smart homes, smart cities and E-Health systems are commonly known victim of these types of attacks.
Usage Privacy [52]Leakage of services utilization pattern of users.
Location Privacy [52]Capturing user’s location information to expose or observe user moments. Smart homes, smart cities and E-Health systems are commonly known victims of these types of attacks.
Table 2. Internal attacks on fog-based IoT routing.
Table 2. Internal attacks on fog-based IoT routing.
AttacksDescription
Wormhole [53]Initial attacked node forms a path by colluding with other nodes to transfer malicious packets. The path formed among conspiring nodes is called wormhole.
Blackhole [54]A malicious node intervenes in route discovery to be a part of path. It then drops the packets instead of forwarding them. Some blackholes attack the received packets before forwarding.
Greyhole [54]A modified version of blackhole attacks. Data are dropped by the attacking node, but it tells the router that data are transmitted. This attack is difficult to detect by the router as it shows end-to-end connectivity.
Selective forwarding [55]Selective data packets that are required to be transmitted are dropped by nodes resulting in network performance degradation.
Local repair [46]Destabilizing the network and draining neighbor nodes battery by sending false link repair messages. It reduces packet delivery increases end-to-end delays.
Route cache poisoning [56]It involves the alteration of route tables by malicious nodes to poison route caches to other nodes.
Sybil [47]Assumptions of nodes to have multiple identities over the network to create confusion and disruption, which opens the opportunity for malicious nodes to operate.
Sinkhole [57]Malicious node pretends to be the optimal route to the destination node by sending false messages to the initiator node, thus after receiving traffic, it alters the routing and other data to complicate the topological structure of the network.
Hello flood [58]The attacker node broadcasts links to other nodes. The unsuspecting nodes accept that link and consider the attacker node to be the neighbor node. The unsuspecting node start sending packets that are actually wasted as the adversary node is far away and not the neighbor. This creates a routing loop within the network.
Neighbor [54]The neighbor node considers the attacking node (while broadcasting DIO messages with no DIO details) as a newly joined node, which could be a parent node, but this node is out of reach when the neighbor node tries to select it as a parent node.
Version number [54]The attacker node alters its version number in DIO messages and broadcasts to neighbor nodes. This results in routing loops in the network, which disrupt the network topology and deplete nodes energy resources.
Modification [59]Malicious nodes take advantage of no trust levels being measured in the ad-hoc networks to engage in discovering, altering and disrupting the routing in the network. This attack causes traffic redirection and DoS attacks by modifying the protocol messages.
Fabrication [60]Creates forged routing information using routing table overflow attacks, resource consumption and fake route error messages.
Byzantine [61]Aims to decline the network services; the attacker node selectively drops route packets, which create routing loops and send forward those route packets through non-optimal paths.
Location spoofing [61]Pretends to be the nearest destined node to disrupt normal network protocol operations.
Table 3. Core-network and service level challenges and solutions with respective limitations.
Table 3. Core-network and service level challenges and solutions with respective limitations.
ChallengesSolutionLimitations
Identity Verification
  • Identity authentication
  • Co-operative authentication
  • Anonymous authentication
  • Difficult identity authentication realization due to decentralized nature of fog computing
  • Difficult to manage the increased number of users
  • Authentication overhead and delays due to the mobility of IoT devices
  • Redundant authentication efforts are needed
  • Cooperation of fog nodes is needed
  • Privacy preservation is needed
  • Response delay is not acceptable for real time services
Access Control
  • Role-based Access Control policy
  • Attribute-based Access Control policy
  • Device and key management
  • Strong credential handling policies are needed to ensure trustworthiness
  • Federated and distributed access control architecture is needed due to mobility and dynamic device management by the user
  • Multiple device management is needed when accessed by a single user
  • There must be consistent access policy for each user employing different devices to access the services
  • Key management is needed
Lightweight protocol design
  • Lightweight cryptographic techniques
  • Lightweight elliptic curve cryptosystem
  • Need to design efficient lightweight protocols to support real time services of fog assisted IoT applications
Intrusion Detection
  • Host-based Intrusion Detection system (IDS)
  • Network-based IDS
  • Distributed IDS
  • Mobile Sybil defence
  • Cryptography-based Sybil defence
  • It is challenging to design a robust, reliable and efficient IDS for fog computing due to its heterogeneous, decentralized and distributed architecture
  • Local as well as global intrusion detection systems are needed in fog computing
  • Behavior features sharing is needed among cooperative fog nodes; the way information is shared in a decentralized architecture to obtain quick detection of intrusion and its prevention is a challenging matter
  • The basic information of the user is needed by the detector to differentiate between legitimate and Sybil user resulting in privacy leakage
  • In Sybil Defence, the data available on single fog node might not be enough to know if the user is Sybil or not because of crucial cooperation among fog nodes
Trust Management
  • Evidence-based trust model
  • Monitoring-based trust model
  • Reputation management
  • Behavior information of fog nodes is difficult to collect and maintain in order to maintain the trust evaluation of fog computing in decentralized architecture
  • Situational trust matrices are needed for various services and applications
  • Adaptive, scalable and consistent trust management design is needed due to IoT device mobility
Privacy-conserving packet forwarding
  • Privacy-preserving packet forwarding
  • Users privacy leakage
Rogue fog node detection
  • Trust-Based Routing Mechanism
  • Complex calculations
  • Scalability issues
  • Message overhead
  • Slow convergence
Table 4. Data center level challenges and solutions with respective limitations.
Table 4. Data center level challenges and solutions with respective limitations.
ChallengesSolutionLimitations
Data identification, aggregation and integrity
  • Symmetric encryption
  • Asymmetric encryption
  • Homomorphic encryption
  • One-way trapdoor permutation
  • Key distribution and key agreement
  • Homomorphic signature
  • Provable data possession
  • Overhead of identifying sensitive data
  • Difficult to protect sensitive data due to the large number of IoT devices
  • Data aggregation requirements vary due to heterogeneous IoT application.
  • Difficult to check the integrity of data due to transient storage, user mobility and variety of keys used by IoT devices
  • Data integrity verification is comparatively less efficient
Secure data distribution
  • Proxy re-encryption
  • Attribute-based encryption
  • Key-aggregate encryption
  • Due to time-consuming bilinear pairing, secure data sharing is not very efficient
  • Key management is challenging
Secure content distribution
  • Secure service discovery
  • Broadcast encryption
  • Key management mechanism
  • Anonymous broadcast encryption
  • Key management and broadcast encryption is challenging
  • Simultaneous secure service discovery and anonymous broadcast encryption is needed
Secure big data analysis
  • Fully homomorphic encryption
  • Differential privacy
  • Computational overhead
  • Designing decentralized big data analysis is challenging with differential privacy
Secure computation
  • Server-aided exponentiation
  • Server-aided verification
  • Server-aided encryption
  • Server-aided function evolution
  • Server-aided key exchange
  • Execution of complex computational tasks heavier than exponentiation, encryption/decryption and signature verification
  • Smaller multiple fog nodes are even powerful than a single server
Verifiable computation
  • Privately verifiable computation
  • Publically verifiable computation
  • Mostly based on theoretical approaches
  • Due to distributed architecture of fog computing, an error may be spread to other nodes resulting incorrect final results
  • Verification of results is needed
  • Tracing of compromised fog node is needed
Table 5. Device level security challenges and solutions with respective limitations.
Table 5. Device level security challenges and solutions with respective limitations.
ChallengesSolutionLimitations
Confidentiality
  • Authentication protocols
  • Privacy preservation techniques
  • Difficult identity authentication realization due to decentralized nature of fog computing
  • Scalability issues
  • Response delay due to the mobility of IoT devices
  • Memory and processing overhead due to fixed and predefined large sized keys
  • High computation cost
  • Key management is needed
Light-weight trust management
  • Trust-based routing protocols
  • Trade-off between computation cost and security requirements
  • Scenario specific
  • Compatibility issues with resource-constrained IoT devices
Table 6. Blockchain-based security solutions in IoT systems.
Table 6. Blockchain-based security solutions in IoT systems.
DescriptionAdvantages
A distributed IoT network architecture consisting of an SDN base network using the blockchains technique [159]
  • Improved system’s performance and capacity
  • Threat prevention and protection, data protection, access control, and mitigate network attacks such as cache poising/ARP spoofing, DDoS/DoS attacks
An efficient decentralized authentication mechanism based on the public blockchain, Ethereum to create secured virtual zones for secure communication [152]
  • Not limited to specific IoT services and scenarios
  • Relies on a public blockchain, hence possesses all of its security properties
  • Well defined security requirements for authentication
A lightweight BC-based hierarchical architecture for IoT that uses a centralized private Immutable Ledger and a distributed trust to reduce the block validation processing time [149]
  • Lightweight yet retains privacy and security benefits of classical blockchain security solutions
  • Elimination of overheads associated with conventional blockchain
  • No mining and its processing related delays
  • Low packet and processing overhead
A decentralized network model based on blockchain approach for data preserving, data integrity and blocking of unregistered devices using Physical Unclonable Functions (PUFs) and Ethereum [153]
  • Unique identity to each IoT device
  • Defense against botnets and bogus requests such as Denial of Service (DoS), and Distributed Denial of Service (DDoS)
  • Data provenance and integrity
A blockchain-based decentralized, infrastructure-independent proof-of-location technique for location trustworthiness and user privacy preservation [160]
  • Unlimited identifiers for users to avoid location attacks
  • Blockchain is used to store proofs of location
  • Geographic location verification
  • User location privacy preservation
A cloud-based blockchain solution for identifying IoT devices manufacturing provenance while enforcing users privacy preservation using EPID (Enhanced Privacy Identity protocol) of Intel to incentivize IoT devices for data sharing [161]
  • Support anonymous device commissioning and incentive to IoT devices
  • Ensures privacy-preservation
A blockchain-based scheme called Healthcare Data Gateway (HGD) architecture to enable patient to own, control and share their own data easily and securely without violating privacy [150]
  • No need for trusted third party
  • Ensures privacy-preservation
  • Ensure data confidentiality, data authenticity and data integrity
A blockchain-based security and privacy scheme for smart homes [151]
  • Low packet, time and energy overheads
  • Ensured availability of devices
  • Resilient against DDoS and linking attacks
A blockchain solution for preserving data privacy in Internet of Things using smart contracts along with a firmware scheme using blockchain for prevention of fraudulent data [162]
  • Trustless access control management
  • constrained IoT device tampering to prevent fraudulent data
A blockchain-based proof of concept for securing consumer/home-based IoT devices and the networks by using Ethereum [163]
  • No significant storage and CPU overheads
  • Utilization of built-in asymmetric key encryption and digital signatures present in Ethereum protocol

Share and Cite

MDPI and ACS Style

Tariq, N.; Asim, M.; Al-Obeidat, F.; Zubair Farooqi, M.; Baker, T.; Hammoudeh, M.; Ghafir, I. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 2019, 19, 1788. https://doi.org/10.3390/s19081788

AMA Style

Tariq N, Asim M, Al-Obeidat F, Zubair Farooqi M, Baker T, Hammoudeh M, Ghafir I. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors. 2019; 19(8):1788. https://doi.org/10.3390/s19081788

Chicago/Turabian Style

Tariq, Noshina, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, and Ibrahim Ghafir. 2019. "The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey" Sensors 19, no. 8: 1788. https://doi.org/10.3390/s19081788

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop