on simulation create One fog node With showing data getting collected from Edge devices.
Encrypt that data. Demonstrate of a hacker hacking the fog node, how he can monitor the raw data that is shared and show data theft condition. When data is encrypted, if hacker hacks the node, he will see encrypted version rather than raw data.
the data is fog node can be about a light. when was light was switched on or off, how much time it was switched on, for how much time it was off.
simulation can be done in IfogSim or any other simulators which seems perfect to simulate the above conditions.