000 04218nam a22005775i 4500
001 978-3-031-08254-2
003 DE-He213
005 20240423125018.0
007 cr nn 008mamaa
008 220908s2022 sz | s |||| 0|eng d
020 _a9783031082542
_9978-3-031-08254-2
024 7 _a10.1007/978-3-031-08254-2
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aSecurity Issues in Fog Computing from 5G to 6G
_h[electronic resource] :
_bArchitectures, Applications and Solutions /
_cedited by Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXII, 164 p. 52 illus., 33 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInternet of Things, Technology, Communications and Computing,
_x2199-1081
505 0 _aIntroduction -- Basics of Internet of Things and Fog Computing -- Secure Multi-Layer Fog Computing system architecture -- Blockchain-based Fog Computing -- Energy-aware Secure Load balancing in Fog Computing -- Real-time secure analytics in Fog Computing -- Secure Location-based services in Fog Network -- Security Challenges for Fog Enabled Internet of Things (IoT) and Industrial Internet of Things (IIoT) -- Cyber-Physical security of fog devices -- Block-chain for fog-enabled critical infrastructures -- Context-Aware Security Mechanisms for Fog Networks -- Advancing the State-of-the-art technologies for secure Fog Enabled 6G Network Technologies -- Management and Orchestration of Fog-based Secure Smart City Applications from 5G to 6G Networks -- Security of Osmotic Computing for 5G Networks -- Conclusion.
520 _aThe book provides an exploration of how fog security is changing the information technology industry and will continue to in the next decade. The book starts with the discussion on how fog computing enables key applications in 5G, the Internet of Things, and big data. It then presents an overview of fog/edge computing, focusing on its relationship with cloud technologies and the future use of secure 5G/6G communications. The book also provides a comprehensive review of liabilities in fog/edge computing within multi-level architectures and intelligent management. It finally lands on the analysis of the applicability of fog/edge computing in smart cities, including the area of Industrial IoT, edge-based augmented reality, data streaming, and blockchain. The various use cases of fog/edge security and its impact on the technology industry; An overview of blockchain to apprehend security services in fog/edge computing; Promising key technologies to support5G and 6G networks, with detailed explanations of the related security and privacy issues. .
650 0 _aTelecommunication.
650 0 _aCooperating objects (Computer systems).
650 0 _aApplication software.
650 1 4 _aCommunications Engineering, Networks.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aBhatt, Chintan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWu, Yulei.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHarous, Saad.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVillari, Massimo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031082535
776 0 8 _iPrinted edition:
_z9783031082559
776 0 8 _iPrinted edition:
_z9783031082566
830 0 _aInternet of Things, Technology, Communications and Computing,
_x2199-1081
856 4 0 _uhttps://doi.org/10.1007/978-3-031-08254-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c173228
_d173228