TY - CHAP
T1 - Physical Layer Security Challenges and Solutions for Beyond 5G Fog Computing Networks
AU - Brighente, Alessandro
AU - Conti, Mauro
AU - Mohammadnia, Foroogh
PY - 2022
Y1 - 2022
N2 - The largely distributed nature of fog computing (FC) provides a major attack surface with increased possibilities for attackers. Compared to networks with higher centralization, securing an FC network represents a significant challenge. This issue is complicated since edge nodes are usually resource-constrained and cannot resort to sophisticated cryptographic solutions. Furthermore, the deployment of a public key infrastructure is complicated considering the large number of connected devices. In this chapter, we investigate the challenges and possibilities of wireless communications in fog computing. In particular, we investigate the advantages provided by the adoption of physical layer security (PLS) techniques. Thanks to PLS and the combination of beyond 5G technologies, we show how an FC network can be secured using low-complexity PLS solutions viable for resource-constrained devices. We also show how PLS solutions can guarantee important features in an FC network, such as authorization and location verification.
AB - The largely distributed nature of fog computing (FC) provides a major attack surface with increased possibilities for attackers. Compared to networks with higher centralization, securing an FC network represents a significant challenge. This issue is complicated since edge nodes are usually resource-constrained and cannot resort to sophisticated cryptographic solutions. Furthermore, the deployment of a public key infrastructure is complicated considering the large number of connected devices. In this chapter, we investigate the challenges and possibilities of wireless communications in fog computing. In particular, we investigate the advantages provided by the adoption of physical layer security (PLS) techniques. Thanks to PLS and the combination of beyond 5G technologies, we show how an FC network can be secured using low-complexity PLS solutions viable for resource-constrained devices. We also show how PLS solutions can guarantee important features in an FC network, such as authorization and location verification.
KW - Authentication
KW - Authorization
KW - Fog computing
KW - Multi-antenna technology
KW - Physical layer security
KW - Privacy
UR - http://www.scopus.com/inward/record.url?scp=85138157459&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-08254-2_4
DO - 10.1007/978-3-031-08254-2_4
M3 - Chapter
AN - SCOPUS:85138157459
T3 - Internet of Things
SP - 59
EP - 77
BT - Internet of Things
PB - Springer
ER -