The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security and Privacy in IoT, Fog, and Blockchain Networks
|
Author(s): Nikhil Kumar Goyal (Poornima University, Jaipur, India)
Copyright: 2025
Pages: 28
Source title:
Energy-Efficient Deep Learning Approaches in IoT, Fog, and Green Blockchain Revolution
Source Author(s)/Editor(s): Anwar Ali Sathio (Benazir Bhutto Shaheed University, Pakistan), Muhammad Malook Rind (Sindh Madressatul Islam University, Pakistan), Shafique Ahmed Awan (Benazir Bhutto Shaheed University, Pakistan)and Allah Rakhio Junejo (GC University, Pakistan)
DOI: 10.4018/979-8-3373-0300-0.ch015
Purchase
|
Abstract
The convergence of the Internet of Things (IoT), fog computing, and block chain technology has revolutionized contemporary digital ecosystems by making data management decentralized, efficient, and scalable. Nonetheless, this integration poses serious security and privacy threats. IoT devices produce enormous amounts of sensitive data, making them easy targets for cyber attacks, unauthorized access, and data breaches. Classic cloud-based solutions tend to be challenged by latency, bandwidth limitations, and centralized attacks, making the use of fog computing inevitable to decentralize data processing for better responsiveness and decreased dependency on remote cloud servers. While fog computing offers advantages, it also poses new security threats through possible insider attacks and data integrity issues. Block chain technology solves these problems by presenting a tamper-resistant, decentralized ledger that improves trust, security, and transparency for IoT networks. Block chain, via cryptographic authentication, consensus protocols, and smart contracts, ensures the secure transaction of data while alleviating risks against unauthorized data manipulation. Scalability, computational complexity, and energy efficiency are still challenges that need to be met for widespread IoT adoption. This chapter discusses the complex security and privacy problems in IoT, fog, and blockchain networks and examines current threats and countermeasures. Advanced cryptographic methods, secure communication schemes, and access control techniques for strengthening the security of these connected systems are mentioned. It further presents future research directions and trends that will improve a safer, more efficient, and privacy-augmented digital infrastructure.
Related Content
Aditi Nag.
© 2026.
48 pages.
|
Mayur Thakur, Shikha Sharma, Trilochan Kumar.
© 2026.
44 pages.
|
Partha Mukhopadhyay, Prachee Parwanee.
© 2026.
36 pages.
|
Kamaraj Kalaimathy, Chathana Thagavel, Sofiya M. Karunanithi.
© 2026.
30 pages.
|
İlhami Ay, Murat Dal.
© 2026.
34 pages.
|
Vinupandyan Lakshmanan.
© 2026.
32 pages.
|
Muhammad Usman Tariq.
© 2026.
28 pages.
|
|
|