Saeed Javanmardi , Alfredo Nascita , Antonio Pescapè , Giovanni Merlino , Marco Scarpa
{"title":"物联网雾网络中安全、隐私和资源效率的集成视角:综合调查","authors":"Saeed Javanmardi , Alfredo Nascita , Antonio Pescapè , Giovanni Merlino , Marco Scarpa","doi":"10.1016/j.comnet.2025.111470","DOIUrl":null,"url":null,"abstract":"<div><div>The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111470"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An integration perspective of security, privacy, and resource efficiency in IoT-Fog networks: A comprehensive survey\",\"authors\":\"Saeed Javanmardi , Alfredo Nascita , Antonio Pescapè , Giovanni Merlino , Marco Scarpa\",\"doi\":\"10.1016/j.comnet.2025.111470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111470\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004372\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004372","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
An integration perspective of security, privacy, and resource efficiency in IoT-Fog networks: A comprehensive survey
The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.