You are on page 1of 21

Integration of Iot

and Fog computing

Done by:
Uday chandra Suthari
Cse II B
18311A05B7
Contents:
● Introduction
● Architecture of Iot
● Smart Environment Application Domain
● Fog Computing
● Why Fog computing
● Fog computing architecture
● IOT AND FOG COMPUTING
INTEGRATION
● Comparision of Cloud and Fog features
● Features of Fog Computing
● Security Threats:
● Conclusion
● References

2
Introduction
Internet of Things:
It is the interconnection of various physical
entities that convey and trade information in the
sensors, smart meters, phones and vehicles,
radio-frequency identification tags, and etc.

Iot gadgets create a lot of information, which


acquire enormous computing facility, storage
area, and communication data transfer capacity.

3
Architecture of
Iot

Four types :
1. Sensors Layer
2. Network Layer
3. Middleware Layer
4. Application Layer

4
“Sensors:
This layer is to sense and assembling
data from the environment. Sensors, barcode
labels, RFID tags, GPS, camera, and actuator
are present in this layer

5

Network Layer:
This layer is used to gather the data from
the sensor layer and sends to the internet.
Responsible for network layer is interfacing
with other smart things, network devices, and
servers.

6

Middleware Layer:
This layer gets information from Network
layer. Its motivation is service management,
data flow management, and security control. It
additionally performs data handling and takes
choices naturally in view of results.

7

Application Layer:
Application layer gets data from the
Middleware layer and gives worldwide
management of the application. Smart
environment application domain and its
services

8
Smart Environment Application Domain
• Home : Entertainment, Internet Access
• Office : Secure File Exchange, VPN
• Retail : Customer Privacy, Business
Transactions, Business Security.
• City : City Management, Resource
Management, Police Network, Disaster Management.
• Agriculture :Area Monitoring, Condition Sensing,
Fire Alarm, Trespassing.
• Transportation : Road Condition Monitoring,
Traffic Status Monitoring, Traffic Light Control,
Navigation Support.

9
Fog Computing
Fog computing is a decentralized computing
infrastructure in which data, compute, storage and
applications are located somewhere between the data
source and the cloud. Like edge computing, fog
computing brings the advantages and power of the cloud
closer to where data is created and acted upon. 

10
Why Fog
computing
• The goal of Fog computing is to decrease the
involvement of cloud by filtering out data, which is
produced by the rising number of sensors.
• To provide and interconnection between cloud and
edge computing

11
Architecture and Fog Computing

12
IOT AND FOG COMPUTING
INTEGRATION
Internet of Things (IoT) and Fog/edge
computing to be integrated which enable
services such as compute data, storage, and
devices organized at the edge of the network.
To improve the user’s experience and flexibility
of the services in case of failures by using
integration of IoT and fog computing

13
Comparision of Cloud and Fog
features
Features Cloud Fog

Latency High low

Architecture Centralisation Decentralisation

Content Central
Anywhere
Generation location

Content
Consumption End Devices Anywhere

On the Handhold
Service Access Through Core
Device
14
Features of Fog Computing
• Expenditure : Fog computing can reduce the amount of data that is
being moved to the cloud
• Location Awareness : Fog nodes are located effectively
and to support IoT devices with services at the edge of the
Network
• Geographic Distribution: The fog nodes are placed
distributed, which can receive or send high-quality data stream
from or to IoT devices.
• Low Latency : Fog nodes can provide services such as
computation and storage instead of using cloud computing.
Since the fog nodes are placed near to the IoT gadgets, the
response dormancy is much lower when compared with cloud
computing.

15
Features of Fog Computing
• Large-Scale IoT Applications Support : Large-scale
IoT applications such as smart environment, smart grid, smart
agriculture, smart shopping cart which are supported by fog
computing.
• Decentralization : Fog computing manages resources and
services in a decentralized manner. The fog nodes provide
services for IoT applications in a decentralized manner.

16
Security Threats:
• Tampering: Transmitting data between fog nodes and IoT
devices or between IoT devices can modify, drop, and delay by an
attacker which degrades its efficiency.

• Eavesdropping: Attackers eavesdrop on communication


channels to read the content. Even system use encryption can be

.
vulnerable

• Denial-of-Service: An attacker disrupts the IoT and


fog computing services to prevent from accessing the service by
legitimate users.

17
Security Threats:
• Collusion: Any two or more IoT gadgets or fog nodes can collude to
enhance their attack on numerous fog nodes, IoT devices, and fog nodes with IoT
devices The collision occurs when the same frequency using different nodes for
communication at the same time

• Man-in-the-Middle: An attacker modifies the data between two


parties whom they are communicating directly with each other. And also, an attacker
can capture transmitting data between two parties and insert new data.

18
Conclusion:
Integration of Fog and IoT describes about support
of various types of To investigate the fog/edge computing
and IoT with related issues have been talked. The
fundamental reason for this review is to give a profound
comprehension and advantages of IoT and its incorporation
with fog/edge computing.

19
References:
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M.Ayyash, “Internet [13] Stojkoska,B.L.R.,&Trivodaliev,K.V.(2017).A review of Internet of Things for
of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454–1464.
Commun. Surv. Tutor., vol. 17, no. 4, pp. 2347–2376, 2015.
[14] Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud
[2] J. Gubbia, R. Buyyab, S. Marusica, and M. Palaniswamia, “Internet of Things computing and internet of things: A survey.Future Generation Computer Systems, 56,
(IoT): A Vision, Architectural Elements, and Future Directions,” Futur. Gener. Comp. 684–700.
Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
[15] Qingping Chi, Hairong Yan, Chuan Zhang, Zhibo Pang, and Li Da Xu, “A
[3] D. Evans, “The Internet of Things: How the Next Evolution of the Internet is Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment”, IEEE
Changing Everything,” Cisco White Paper, 2011. Transactions on Industrial Informatics, vol. 10, no. 2, May 2014.

[4] J. Camhi, “Former Cisco CEO John Chambers Predicts 500 Billion Connected [16] Arwa Alrawais,Abdulrahman Alhothaily,Chunqiang Hu, and Xiuzhen Cheng
Devices by 2025,” Business Insider, 20 George Washington University,” Fog Computing for the Internet of Things: Security
and Privacy Issues”, IEEE Internet Computing, vol. 21,no. 2, March 2017.
[5] J. Shropshire, “Extending the Cloud with Fog: Security Challenges and
Opportunities,” in Proc. of Information System, pp. 1–10,2014. [17] Jianbing Ni, Kuan Zhang, Xiaodong Lin, Xuemin Sherman Shen, "Securing Fog
Computing for Internet of Things Applications: Challenges and Solutions",
[6] Q. Pu et al., “Low latency geo-distributed data analytic,” in Proc.ACM Communications Surveys & Tutorials IEEE, vol. 20, pp. 601-628, 2018, ISSN 1553-
SIGCOMM, London, U.K., Aug. 2015, pp. 421–434.15. 877X.

[7] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and [18] Opeyemi Osanaiye, Shuo Chen, heng Yan, Rongxing Lu, Kim- Kwang Raymond
challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016. Choo and Mqhele Dlodlo,” From Cloud to Fog Computing: A Review and a
Conceptual Live VM Migration Framework”, IEEE Access , vol. 5, pp. 8284 – 8300,
[8] S. Yi, C. Li, and Q. Li, “A survey of fog computing: Concepts, applications and Apr 2017.
issues,” in Proc. Workshop Mobile Big Data, Hangzhou, China, Jun. 2015, pp. 37–42.
[19] Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub and Monther
[9] L.M. Vaquero and L. Rodero-Merino, “Finding Your Way in the Fog: Towards A AlDwairi,”Collusion attacks in Internet of Things: Detection and mitigation using a
Comprehensive Definition of Fog Computing,” ACM SIGCOMM Comp. Commun. fog based model”, Sensors Applications Symposium (SAS), IEEE, 2017.
Rev., vol. 44, no. 5, pp. 27– 32, 2014.
[20] Wang, Y., Attebury, G., & Ramamurthy, B.,”A survey of security issues in
[10] Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao ,”A wireless sensor networks”, IEEE CommunicationsSurveys & Tutorials, 8(2), pp. 2–
Survey on Internet of Things: Architecture, Enabling Technologies, Security and 23,2006.
Privacy, and Applications”,in IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO.
5, Oct. 2017,pp. 1125-1142 [21] Ruinian Li, Tianyi Song, Nicholas Capurso, Jiguo Yu, Jason Couture, Xiuzhen
Cheng. "IoT Applications on Secure Smart Shopping System", IEEE Internet of Things
[11] F. Bonomi, R. A. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in Journal, vol. 4, pp. 1945 – 1954,2017.
the Internet of Things,” in Proc. 1st Edition MCC Workshop Mobile Cloud Comput.,
Helsinki, Finland, Aug. 2012, pp. 13–16. [22] S. R. Prathibha, Anupama Hongal, M. P. Jyothi,"IOT Based Monitoring System in
Smart Agriculture", 2017 International Conference on Recent Advances in Electronics
[12] S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing: Concepts, Applications and and Communication Technology (ICRAECT), 2017. Second
Issues,” in Proc. of Mobidata, 2015, pp. 1–6.

20
Thanks!
Any questions?

21

You might also like