Fog Computing for Intelligent IoT Applications

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (30 November 2020) | Viewed by 65310

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Computer and Information Science, University of Ljubljana, Ljubljana, Slovenia
Interests: decentralized, distributed and cloud computing; semantic web; software engineering

E-Mail Website
Guest Editor
Faculty of Computer and Information Science, University of Ljubljana, Ljubljana, Slovenia
Interests: Internet of Things and data technologies; speech technologies; software engineering

Special Issue Information

Intelligent IoT applications require computing power, connectivity, and access to geographically distributed data. Due to the high heterogeneity and complexity of hardware devices and software, it is necessary to provide for high levels of adaptability in modern software systems. It is also necessary to address problems of trust, security, and reliability while keeping system performance and reducing energy consumption. The quadrumvirate technologies—Internet of Things (IoT), Artificial Intelligence (AI), Cloud (Cloud, Fog, Edge) and Blockchain—complemented with modern software engineering approaches, such as integration of software development practices with operations to assure continuous delivery of high quality software (DevOps), may effectively be combined in order to address some of these needs. They form the substrate of Fog Computing. We therefore invite the submission of papers related to Fog Computing for Intelligent IoT Applications, including, but not limited to: new architectures, innovative applications, specific solutions to uncertainty, and complexity and heterogeneity problems.

All contributions will be subject to standard peer review on quality, relevance, and novelty, which will decide acceptance. All submissions will be held in confidentiality prior to publication. Please follow the journal rules for editing.

Assoc. Prof. Dr. Vlado Stankovski
Prof. Dr. Marko Bajec
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things (IoT)
  • Artificial Intelligence (AI)
  • Cloud
  • Fog
  • Edge
  • Blockchain
  • DevOps
  • software engineering
  • uncertainty
  • complexity
  • heterogeneity

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 3964 KiB  
Article
IoT Privacy and Security: Challenges and Solutions
by Lo’ai Tawalbeh, Fadi Muheidat, Mais Tawalbeh and Muhannad Quwaider
Appl. Sci. 2020, 10(12), 4102; https://doi.org/10.3390/app10124102 - 15 Jun 2020
Cited by 336 | Viewed by 64634
Abstract
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we [...] Read more.
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers of IoT driven applications. In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. The proposed cloud/edge supported IoT system is implemented and evaluated. The lower layer represented by the IoT nodes generated from the Amazon Web Service (AWS) as Virtual Machines. The middle layer (edge) implemented as a Raspberry Pi 4 hardware kit with support of the Greengrass Edge Environment in AWS. We used the cloud-enabled IoT environment in AWS to implement the top layer (the cloud). The security protocols and critical management sessions were between each of these layers to ensure the privacy of the users’ information. We implemented security certificates to allow data transfer between the layers of the proposed cloud/edge enabled IoT model. Not only is the proposed system model eliminating possible security vulnerabilities, but it also can be used along with the best security techniques to countermeasure the cybersecurity threats facing each one of the layers; cloud, edge, and IoT. Full article
(This article belongs to the Special Issue Fog Computing for Intelligent IoT Applications)
Show Figures

Figure 1

Back to TopTop