Fog and cloud computing are very attractive enabling technologies for Internet of Things applications. The virtualization of smart devices which compose the Internet of Things network is a promising field of research, leading to the design and development of new services and uses. To the best of our knowledge, this paper presents the first attempt to use a cybersecurity attack to realize a fog computing agent for Internet of Things systems. In particular the Man-In-The-Middle attack will be use to show the foundation of the proposed Man-In-the-Middle-Iot-Computing tool, namely MIMIC, and through the examples and tests performed we will show its potentialities.

MIMIC: A Cybersecurity Threat Turns into a Fog Computing Agent for IoT Systems / Incipini, L.; Belli, A.; Palma, L.; Concetti, R.; Pierleoni, P.. - ELETTRONICO. - (2019), pp. 469-474. (Intervento presentato al convegno 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2019 tenutosi a Grand Hotel Adriatic Congress Centre and Remisens Hotel Admiral in Opatija, hrv nel 2019) [10.23919/MIPRO.2019.8756651].

MIMIC: A Cybersecurity Threat Turns into a Fog Computing Agent for IoT Systems

Incipini L.;Belli A.;Palma L.;Concetti R.;Pierleoni P.
2019-01-01

Abstract

Fog and cloud computing are very attractive enabling technologies for Internet of Things applications. The virtualization of smart devices which compose the Internet of Things network is a promising field of research, leading to the design and development of new services and uses. To the best of our knowledge, this paper presents the first attempt to use a cybersecurity attack to realize a fog computing agent for Internet of Things systems. In particular the Man-In-The-Middle attack will be use to show the foundation of the proposed Man-In-the-Middle-Iot-Computing tool, namely MIMIC, and through the examples and tests performed we will show its potentialities.
2019
978-953-233-098-4
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11566/270665
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact