{"id":"https://openalex.org/W4408092595","doi":"https://doi.org/10.1109/ants63515.2024.10898437","title":"FogIoT: Fog Computing based Security Frameworks for Software-defined IoT","display_name":"FogIoT: Fog Computing based Security Frameworks for Software-defined IoT","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4408092595","doi":"https://doi.org/10.1109/ants63515.2024.10898437"},"language":"en","primary_location":{"id":"doi:10.1109/ants63515.2024.10898437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027999447","display_name":"M. Aslam","orcid":"https://orcid.org/0000-0001-8172-5799"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Anjum Mohd Aslam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086598229","display_name":"Rajat Chaudhary","orcid":"https://orcid.org/0000-0002-6554-918X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajat Chaudhary","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051575430","display_name":"Ishan Budhiraja","orcid":"https://orcid.org/0000-0002-7495-5032"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ishan Budhiraja","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100457798","display_name":"Vishal Sharma","orcid":"https://orcid.org/0000-0003-3103-6236"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vishal Sharma","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027999447"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3309591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7898006439208984},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.5702497363090515},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5639193058013916},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.47724246978759766},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4617732763290405},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32557186484336853},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.18090441823005676},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16146516799926758},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1377217173576355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7898006439208984},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.5702497363090515},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5639193058013916},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.47724246978759766},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4617732763290405},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32557186484336853},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.18090441823005676},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16146516799926758},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1377217173576355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants63515.2024.10898437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285553818"],"abstract_inverted_index":{"Software-defined":[0],"Networking":[1],"(SDN)":[2],"has":[3],"been":[4],"implemented":[5],"in":[6,33,50,88,169],"Internet":[7],"of":[8,99,111,155,173,179],"things":[9],"(IoT)":[10],"networks":[11,53],"to":[12,67,127,136,143,151],"attain":[13],"centralized":[14,23],"control":[15,102],"and":[16,70,117,130,160,181],"improve":[17,97],"network":[18,92,112],"management.":[19],"However,":[20],"the":[21,44,51,105,109,138,153,156],"SDN":[22],"approach":[24,82,107,135],"can":[25,41],"be":[26],"compromised":[27],"by":[28],"malicious":[29],"sensor":[30],"nodes":[31,113,142],"engaging":[32],"activities":[34],"like":[35],"message":[36],"dropping":[37],"or":[38],"flooding,":[39],"which":[40,62],"negatively":[42],"impact":[43],"network\u2019s":[45],"functionality.":[46],"The":[47],"security":[48,86],"measures":[49],"IoT":[52],"are":[54],"often":[55],"based":[56],"on":[57,101],"an":[58,124],"idealized":[59],"trusted":[60],"environment,":[61],"is":[63,167],"not":[64],"practical":[65],"due":[66],"resource":[68],"constraints":[69],"high":[71],"computational":[72],"requirements.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"proposed":[78,106],"a":[79,118,132,148],"lightweight":[80,157],"cryptographic":[81],"for":[83,141],"detecting":[84,170],"potential":[85],"threats":[87],"wireless":[89],"fog-enabled":[90],"SDN-IoT":[91],"named":[93],"as":[94,176],"FogIoT.":[95],"To":[96],"detection":[98],"attacks":[100,174],"plane":[103],"traffic,":[104],"examines":[108],"credibility":[110],"using":[114],"reliability":[115,119,129],"metrics":[116],"index.":[120],"We":[121,146],"also":[122],"propose":[123],"acknowledgment-based":[125],"mechanism":[126],"capture":[128],"used":[131],"weighted":[133],"averaging":[134],"determine":[137],"confidence":[139],"index":[140],"ensure":[144],"credibility.":[145],"demonstrated":[147],"simulation":[149],"study":[150],"analyze":[152],"performance":[154],"cryptography":[158],"algorithm":[159],"results":[161],"from":[162],"simulations":[163],"show":[164],"that":[165],"FogIoT":[166],"effective":[168],"various":[171],"types":[172],"such":[175],"sink-hole,":[177],"denial":[178],"service,":[180],"reputation-deceptive.":[182]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
