I. Introduction
The fog transpired as a computing and networking archi-tecture to support the Internet of Things (IoT). Although fog computing decreases the reliance of edge services on the cloud, it inherits the security and trust issues of cloud computing and presents a larger attack vector against data confidentiality, integrity, and availability [1]. It also engenders many additional functional, performance, and deployment requirements that increase the cost of security management. Indeed, adapting cloud security solutions to fit within the fog paradigm may not be sufficient to provide secure access, efficient authentication, and reliable communication to IoT applications [2].