SL5 Flashcards

1
Q

What are the two fog computing based frameworks?

A

Fog-Device framework provides most of the services without cloud involvement

Fog-Cloud-Device framework utilizes cloud resources to provide most of the services to the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of Fog over Cloud?

A

Fog computing provides decentralised architecture

Fog computing can improve security, minimize the data stored on the cloud and to increase the overall efficiency of IoT applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main aim of fog computing?

A

to handle the IoT data locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can fog computing be used for IoT data security attacks?

A

Can handle man-in-the-middle attacks (by adding a security layer), data transit attacks, and eavesdropping

Provide support for cryptographic solutions

Facilitate and protect resource-constrained devices/sensors

Provide real-time incident response services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the security challenges in Fog computing and their solutions?

A

Real-time services: fog nodes provide real-time processing of data making them vulnerable
o Solutions: Intrusion detection, identification and authentication

Local storage: fog nodes do not manage data on the cloud. Sensitive data is vulnerable and data may not be shared securely.
o Solutions:
 identifying and protecting sensitive data
 use cryptographic techniques

Data dissemination: encrypted data led to challenges in sharing, searching and aggregation of data
o Solution: use encryption-based solutions and implement secure aggregation algorithms

Decentralised computation: makes the data vulnerable to disclosure to adversaries and the data may not have integrity
o Solutions:
 Server-aided computation
 Data processes can be cross verified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do most protocols for the edge layer not use a security layer?

A

As it creates additional overhead in terms of power consumption and processing time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of issues specific to edge devices?

A

Sleep deprivation attacks
Battery draining attacks
Outage attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is edge computing?

A

Edge computing based: the computation and analysis power is provided at the edge itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is edge computing used for IoT data security?

A

Preventing data breaches: by minimizing data exchange

Resolving safety issues: can be used to process safety-critical data

Detecting security attacks: intrusion detection and prevention mechanisms and cryptography based solutions can be deployed at the sensing layer level

Resolving bandwidth issues: can be used to perform data aggregation and forward only the selected data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main security challenge in edge computing?

A

the resource-constrained nature of edge devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly