FoTSeC — Human Security in Fog of Things

Today’s devices, which make up the Internet of Things (IoT) and Cyber-Physical Systems (CPS), are becoming increasingly more heterogeneous, mobile and intelligent. They represent an untapped computational resource that is available on site. By taking advantage of these devices we reduce the need for distant service providers: direct communication with neighbour devices becomes key for handling local tasks and information. Thus, the traditional cloud is “descending” to the network edge and becoming “diffused” among the client devices in both mobile and wired networks. Since single individuals are now becoming walking sensor networks, with many types of devices (smart-shirts, smartphones, smart glasses, smart watches…), human behavior begins to have a significant impact on the availability of resources. This means that security risks rise tremendously in these distributed clouds.The objective of this paper is to present an analysis of security in the future Internet - an Internet that integrates the concepts of Fog of Things (FoT) and Human in the Loop (HiTL). This paper also describes our model and the platform that we implemented for the evaluation tests.

[1]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[2]  Ahmed Karmouch,et al.  Vertical Mobility Management Architectures in Wireless Networks: A Comprehensive Survey and Future Directions , 2012, IEEE Communications Surveys & Tutorials.

[3]  Sirajum Munir,et al.  Cyber Physical System Challenges for Human-in-the-Loop Control , 2013, Feedback Computing.

[4]  Ahmad Rahmati,et al.  Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity , 2011, IEEE Transactions on Mobile Computing.

[5]  Sirajum Munir,et al.  Reducing Energy Waste for Computers by Human-in-the-Loop Control , 2014, IEEE Transactions on Emerging Topics in Computing.

[6]  Jorge Sá Silva,et al.  A Survey on Human-in-the-Loop Applications Towards an Internet of All , 2015, IEEE Communications Surveys & Tutorials.

[7]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[8]  Stephan Sigg,et al.  An Alignment Approach for Context Prediction Tasks in UbiComp Environments , 2010, IEEE Pervasive Computing.

[9]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[10]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[11]  Ioannis Chatzigiannakis,et al.  Flexible experimentation in wireless sensor networks , 2012, Commun. ACM.

[12]  Antonio F. Gómez-Skarmeta,et al.  Mobile IP-Based Protocol for Wireless Personal Area Networks in Critical Environments , 2011, Wirel. Pers. Commun..

[13]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[14]  References , 1971 .

[15]  Vassilis Kostakos,et al.  Human-in-the-loop: rethinking security in mobile and pervasive systems , 2008, CHI Extended Abstracts.

[16]  Lorrie Faith Cranor,et al.  A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.

[17]  Jorge Sá Silva,et al.  New mechanisms for privacy in human-in-the-loop cyber-physical systems , 2015, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[18]  Charalabos Skianis,et al.  A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' Integration , 2013, IEEE Communications Surveys & Tutorials.