Sistemas de Informação (Dec 2022)

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

  • BEZERRA, W. R.,
  • WESTPHALL, C. B.

Journal volume & issue
Vol. 1, no. 30
pp. 38 – 45

Abstract

Read online

The few resources available on constrained devices in Internet of Things are an important issue when we think about security. In this perspective, our work proposes an agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at the intersection of those areas were brought, supporting other researchers and developers who work in those areas.

Keywords