物联网雾网络中安全、隐私和资源效率的集成视角:综合调查

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Saeed Javanmardi , Alfredo Nascita , Antonio Pescapè , Giovanni Merlino , Marco Scarpa
{"title":"物联网雾网络中安全、隐私和资源效率的集成视角:综合调查","authors":"Saeed Javanmardi ,&nbsp;Alfredo Nascita ,&nbsp;Antonio Pescapè ,&nbsp;Giovanni Merlino ,&nbsp;Marco Scarpa","doi":"10.1016/j.comnet.2025.111470","DOIUrl":null,"url":null,"abstract":"<div><div>The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111470"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An integration perspective of security, privacy, and resource efficiency in IoT-Fog networks: A comprehensive survey\",\"authors\":\"Saeed Javanmardi ,&nbsp;Alfredo Nascita ,&nbsp;Antonio Pescapè ,&nbsp;Giovanni Merlino ,&nbsp;Marco Scarpa\",\"doi\":\"10.1016/j.comnet.2025.111470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111470\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004372\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004372","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

物联网雾模式改善了延迟和网络使用,因为雾设备离用户很近。但这种亲密关系会带来许多安全和隐私威胁。在研究文章中,典型的方法是将安全性和资源效率分开考虑,并假设另一方面(安全性或资源效率)工作正常。虽然这种观点是合理的和常规的,但在过去的几年里,研究人员试图提出一些同时考虑它们的工作。这意味着他们在考虑其他方面的情况的同时,试图实施他们提出的方法。他们甚至为安全性、隐私性和资源效率提出了不同的方法,并使用特定于每个方面的指标进行测试。集成透视图优化了资源利用并最小化了安全漏洞。据我们所知,本文是第一个从集成的角度来研究文章的调查。本文旨在讨论开发集成物联网雾解决方案的未来研究工作。它研究了聚合视图的视角,并讨论了激励研究人员将它们集成到物联网-雾网络中的必要性。本文研究了物联网雾架构及其相关问题,提供了有前途的应用和使用示例。本文将关注安全、隐私和资源效率的研究分为架构框架、路由协议和资源管理系统。它解释了为什么这些领域很重要,以及为什么需要将它们结合起来。最后,对该领域未来的研究方向进行了展望。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An integration perspective of security, privacy, and resource efficiency in IoT-Fog networks: A comprehensive survey
The IoT-Fog paradigm improves delay and network usage because the Fog devices are close to the users. But this closeness causes numerous security and privacy threats. In the research articles, a typical approach is to consider security and resource efficiency separately and assume the other aspect (security or resource efficiency) is working properly. While this perspective is legitimate and routine, in the last few years, researchers have attempted to propose some works that consider them simultaneously. It means that they try to implement their proposed approaches while considering the situation of other aspects. They even propose different approaches for security, privacy, and resource efficiency and test them using metrics specific to each aspect. The integration perspective optimizes resource utilization and minimizes security breaches. To our knowledge, this article is the first survey to examine articles from an integration perspective. This article aims to discuss future research efforts in developing integrated IoT-Fog solutions. It studies the perspective of an aggregated view and discusses the necessities that motivate researchers to integrate them in IoT-Fog networks. The paper examines the IoT-Fog architecture and its associated issues, providing examples of promising applications and usage. The paper groups the studies focusing on security, privacy, and resource efficiency into architectural frameworks, routing protocols, and resource management systems. It explains why these areas are important and why combining them is needed. Finally, the paper suggests some future research topics in this field.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信