Smart City Gnosys

Smart city article details

Title Flying Through The Secure Fog: A Complete Study On Uav-Fog In Heterogeneous Networks
ID_Doc 26720
Authors Gupta A.; Gupta S.K.
Year 2022
Published International Journal of Communication Systems, 35, 13
DOI http://dx.doi.org/10.1002/dac.5237
Abstract A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers worldwide. UAV's contribution is increasing in day-to-day life, whether it is in a military zone, disaster management, healthcare sector, smart cities, Internet of Things (IoT), urban air mobility, and many more. In contrast, UAV's limited computational capability and low-energy sources pose significant challenges for real-time data processing, storage, networking, and security that are critical in emergencies such as floods, earthquakes, and cyclones. UAVs are rapidly used to satisfy user requirements as well as services. As the demand for UAVs aided heterogeneous wireless networks increases in critical emergencies, fog computing serves several benefits to fulfill users' demands in terms of low latency, support, data storage, mobility, availability, scalability, and so on. This study aims to present a comprehensive study with their technical aspects for understanding fog computing, security issues, privacy concerns, and risks, along with its solutions. This paper suggests the collaboration of UAV-Fog architecture based on the four-tier network consisting of smart things, local UAVs, UAV-Fog, and cloud server, to control UAV's data and also described some of the security issues faced by this cloud infrastructure. Further, this research article also sheds new light on some scenarios of UAV-Fog for such deployments, applications, opportunities, challenges, and their major security threats and their countermeasures. Afterward, we design taxonomy of the collaboration of UAV-Fog with their respective approaches. © 2022 John Wiley & Sons Ltd.
Author Keywords attacks; database encryption; fog; fog computing; QoS; security issues; UAV-Fog; UAVs


Similar Articles


Id Similarity Authors Title Published
59251 View0.898Al-Khafajiy M.; Baker T.; Hussien A.; Cotgrave A.Uav And Fog Computing For Ioe-Based Systems: A Case Study On Environment Disasters Prediction And Recovery PlansUnmanned System Technologies (2020)
59296 View0.892Al-Ahmed S.A.; Ahmed T.; Zhu Y.; Malaolu O.O.; Shakir M.Z.Uav-Enabled Iot Networks: Architecture, Opportunities, And ChallengesWireless Networks and Industrial IoT: Applications, Challenges and Enablers (2020)
59308 View0.891Al-Turjman F.; Abujubbeh M.; Malekloo A.; Mostarda L.Uavs Assessment In Software-Defined Iot Networks: An OverviewComputer Communications, 150 (2020)
5323 View0.889Mekdad Y.; Aris A.; Babun L.; Fergougui A.E.; Conti M.; Lazzeretti R.; Uluagac A.S.A Survey On Security And Privacy Issues Of UavsComputer Networks, 224 (2023)
7185 View0.889Hayawi K.; Anwar Z.; Malik A.W.; Trabelsi Z.Airborne Computing: A Toolkit For Uav-Assisted Federated Computing For Sustainable Smart CitiesIEEE Internet of Things Journal, 10, 21 (2023)
59686 View0.884Arshi O.; Khan I.U.; Kaushik K.; Iqbal N.; Ullah I.; Slimani K.Unmanned Aerial Vehicles Swarm For Protecting Smart Cities: Future Trends And ChallengesUnmanned Aerial Vehicles Swarm for Protecting Smart Cities: Future Trends and Challenges (2025)
3131 View0.884AL-Dosari K.; Fetais N.A New Shift In Implementing Unmanned Aerial Vehicles (Uavs) In The Safety And Security Of Smart Cities: A Systematic Literature ReviewSafety, 9, 3 (2023)
23275 View0.881Alharbi H.A.; Yosuf B.A.; Aldossary M.; Almutairi J.; Elmirghani J.M.H.Energy Efficient Uav-Based Service Offloading Over Cloud-Fog ArchitecturesIEEE Access, 10 (2022)
6708 View0.874Tlili F.; Ayed S.; Chaari Fourati L.Advancing Uav Security With Artificial Intelligence: A Comprehensive Survey Of Techniques And Future DirectionsInternet of Things (Netherlands), 27 (2024)
26764 View0.869Mahmood Z.Fog Computing: Concepts, Frameworks And TechnologiesFog Computing: Concepts, Frameworks and Technologies (2018)