Professional Documents
Culture Documents
COMPUTING
B A S E D O N PA P E R S BY
I VA N A N D F L AV I O
Virtualization Technologies
High Bandwidth Availability Improvements in
Physical Layer
Universal Software Interoperability Standards
INTERNET OF THINGS
INTERNET OF THINGS
DEPLOYMENT PROBLEMS
Lack of shared infrastructure.
Lack of standards.
A missing piece of technology to help
deploy IoT.
Requires interoperability.
Federation.
Fog
Centralized
Distributed
Smart highways.
Smart buildings.
Smart factories.
Smart agriculture.
Robotics.
SDN is:
Intermittent connectivity.
Collisions.
How?
Fog Computing
Applications
SMART GRID
Load Balancing Devices
Help to switch to alternative energy
sources
Fog Collectors
Process data sent by sensors
Filter data locally and send rest
to higher Tiers
Fog supports ephemeral storage
CCONNECTED VEHICLES
Enable Real-Time interaction
Cars
Access Points
Traffic Lights
FOG Clusters analyze data locally to reroute traffic
and maintain flow
WIND FARMS
Fog can be used to regulate the windmills based on
weather data
Better control of turbines
Based on Elevation
Topography of the terrain
Can be used to collect and use long term data
FOG COMPUTING
APPLICATIONS
As a High level programming model for geospatially distributed, large-scale and latency
sensitive Internet applications.
Mobile Fog consists of a set of event handles
and functions that an application can call.
Not a generic model but built for particular
application, while leaving out functions that
deal with technical challenges of involved
image processing primitives.
SECURITY ISSUES
Main security issues are authentication at
different levels of gateways as well as devices
installed at the consumers end.
Each smart meter and smart appliance has an
IP address. A malicious user can either tamper
with its own smart meter, report false
readings, or spoof IP addresses.
MAN-IN-THE-MIDDLE ATTACK
A man-in-the-middle attack is one in which
the attacker secretly intercepts and relays
messages between two parties who believe
they are communicating directly with each
other.
MITM attacks pose a serious threat to online
security because they give the attacker the
ability to capture and manipulate sensitive
information in real-time while posing as a
trusted
party
during
transactions,
conversations, and the transfer of data.
STEALTH TEST
MITM only consume a small amount of resources in Fog
devices, such as negligible CPU utilization and memory
consumption.
STEALTH TEST
In order to hijack and
replay victims video
communication,
a
hook
program
is
inserted
into
the
TCP/IP stack of the
compromised system.
Hook is a technique of
inserting code into a
system call in order to
alter it.
PRIVACY ISSUES
EPPA
An Efficient and Privacy Preserving Aggregation
Scheme for secure smart grid communications
Super increasing sequence to structure multidimensional data and encrypt the structured data
by the homomorphic cryptogram technique.
Ensures privacy of data collected by smart meters
but does not guarantee that the device transmits
the correct report to other gateways.
Data communications from user to smart grid
operation center, data aggregation is performed
directly on cipher-text at local gateways without
decryption.
REFERENCES