A Survey of Security Architectures for Edge Computing-Based IoT

被引:25
作者
Fazeldehkordi, Elahe [1 ]
Gronli, Tor-Morten [1 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Mobile Technol Lab MOTEL, Kirkegata 24-26, N-0153 Oslo, Norway
来源
IOT | 2022年 / 3卷 / 03期
关键词
edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture; ASSISTED INTERNET; CLOUD; THINGS; FOG; EFFICIENT; PRIVACY; PLATFORM; ENERGY; SENSOR; TECHNOLOGIES;
D O I
10.3390/iot3030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
引用
收藏
页码:332 / 365
页数:34
相关论文
共 179 条
  • [21] Chen SL, 2018, 2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), P394, DOI [10.1109/NANA.2018.8648776, 10.1109/NaNA2018.2018.00077]
  • [22] Cheng J., 2016, P 2016 IEEE INT C CO, P1
  • [23] Clarifying Fog Computing and Networking: 10 Questions and Answers
    Chiang M.
    Ha S.
    Chih-Lin I.
    Risso F.
    Zhang T.
    [J]. 1600, Institute of Electrical and Electronics Engineers Inc., United States (55): : 18 - 20
  • [24] Fog and IoT: An Overview of Research Opportunities
    Chiang, Mung
    Zhang, Tao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 854 - 864
  • [25] Performance analysis of device discovery of Bluetooth Low Energy (BLE) networks
    Cho, Keuchul
    Park, Gisu
    Cho, Wooseong
    Seo, Jihun
    Han, Kijun
    [J]. COMPUTER COMMUNICATIONS, 2016, 81 : 72 - 85
  • [26] The mobile sensing platform: An embedded activity recognition system
    Choudhury, Tanzeem
    Consolvo, Sunny
    Harrison, Beverly
    LaMarca, Anthony
    LeGrand, Louis
    Rahimi, Ali
    Rea, Adam
    Borriello, Gaetano
    Hemingway, Bruce
    Klasnja, Predrag Pedja
    Koscher, Karl
    Landay, James A.
    Lester, Jonathan
    Wyatt, Danny
    Haehnel, Dirk
    Hightower, Jeffrey
    [J]. IEEE PERVASIVE COMPUTING, 2008, 7 (02) : 32 - 41
  • [27] Ciaetal M.D., 2017, IEEE Internet Things J, V5, P645
  • [28] cisco, ABOUT US
  • [29] Cisco Press, 2010, Developing Network Security Strategies.
  • [30] Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations
    Condry, Michael W.
    Nelson, Catherine Blackadar
    [J]. PROCEEDINGS OF THE IEEE, 2016, 104 (05) : 938 - 946