PDA

View Full Version : Security Issues in Fog Computing from 5G to 6G



Nyquist
2022-11-02, 03:51 AM
Security Issues in Fog Computing from 5G to 6G: Architectures, Applications and Solutions
The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.- The various use cases of fog/edge security and its impact on the technology industry;
- An overview of blockchain to apprehend security services in fog/edge computing;
- Promising key technologies to support 5G and 6G networks, with detailed explanations of the related security and privacy issues.


2022 - Springer - English - PDF, 4.02 MB