A Survey of Security Architectures for Edge Computing-Based IoT

被引:25
作者
Fazeldehkordi, Elahe [1 ]
Gronli, Tor-Morten [1 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Mobile Technol Lab MOTEL, Kirkegata 24-26, N-0153 Oslo, Norway
来源
IOT | 2022年 / 3卷 / 03期
关键词
edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture; ASSISTED INTERNET; CLOUD; THINGS; FOG; EFFICIENT; PRIVACY; PLATFORM; ENERGY; SENSOR; TECHNOLOGIES;
D O I
10.3390/iot3030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
引用
收藏
页码:332 / 365
页数:34
相关论文
共 179 条
  • [1] Cloud of Things for Sensing-as-a-Service: Architecture, Algorithms, and Use Case
    Abdelwahab, Sherif
    Hamdaoui, Bechir
    Guizani, Mohsen
    Znati, Taieb
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 1099 - 1112
  • [2] Acharya J, 2017, 2017 IEEE FOG WORLD CONGRESS (FWC), P1
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] Alam Tanweer, 2018, International Journal of Interactive Mobile Technologies, V12, P74, DOI 10.3991/ijim.v12i6.6776
  • [5] Alam T, 2020, Arxiv, DOI [arXiv:1902.09744, 10.2139/ssrn.3638980, DOI 10.2139/SSRN.3638980]
  • [6] Technologies and challenges in developing Machine-to-Machine applications: A survey
    Ali, Anum
    Shah, Ghalib A.
    Farooq, Muhammad Omer
    Ghani, Usman
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 124 - 139
  • [7] Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks
    Alonso, Ricardo S.
    Tapia, Dante I.
    Bajo, Javier
    Garcia, Oscar
    de Paz, Juan F.
    Corchado, Juan M.
    [J]. AD HOC NETWORKS, 2013, 11 (01) : 151 - 166
  • [8] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022
  • [9] [Anonymous], 2019, Benefits of Mobile Ticketing in Public Transport
  • [10] [Anonymous], 2016, Standardization of NB-IOT Completed, P1