Fog and cloud computing are very attractive enabling technologies for Internet of Things applications. The virtualization of smart devices which compose the Internet of Things network is a promising field of research, leading to the design and development of new services and uses. To the best of our knowledge, this paper presents the first attempt to use a cybersecurity attack to realize a fog computing agent for Internet of Things systems. In particular the Man-In-The-Middle attack will be use to show the foundation of the proposed Man-In-the-Middle-Iot-Computing tool, namely MIMIC, and through the examples and tests performed we will show its potentialities.
MIMIC: A Cybersecurity Threat Turns into a Fog Computing Agent for IoT Systems
Incipini L.;Belli A.;Palma L.;Concetti R.;Pierleoni P.
2019-01-01
Abstract
Fog and cloud computing are very attractive enabling technologies for Internet of Things applications. The virtualization of smart devices which compose the Internet of Things network is a promising field of research, leading to the design and development of new services and uses. To the best of our knowledge, this paper presents the first attempt to use a cybersecurity attack to realize a fog computing agent for Internet of Things systems. In particular the Man-In-The-Middle attack will be use to show the foundation of the proposed Man-In-the-Middle-Iot-Computing tool, namely MIMIC, and through the examples and tests performed we will show its potentialities.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.