Article - Main Track

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

Author: BEZERRA, W. R.; WESTPHALL, C. B.

Abstract: The few resources available on constrained devices in Internet of Things are an important issue when we think about security. In this perspective, our work proposes an agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at the intersection of those areas were brought, supporting other researchers and developers who work in those areas.

Keywords: internet of things, authentication, constrained devices, fog computing

Full paper

Full Reference: Bezerra, W. R.; Westphall, C. B., "Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing", Revista de Sistemas de Informação da FSMA n 30(2022) pp. 38-45

Back