A Survey of Security Architectures for Edge Computing-Based IoT

被引:25
作者
Fazeldehkordi, Elahe [1 ]
Gronli, Tor-Morten [1 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Mobile Technol Lab MOTEL, Kirkegata 24-26, N-0153 Oslo, Norway
来源
IOT | 2022年 / 3卷 / 03期
关键词
edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture; ASSISTED INTERNET; CLOUD; THINGS; FOG; EFFICIENT; PRIVACY; PLATFORM; ENERGY; SENSOR; TECHNOLOGIES;
D O I
10.3390/iot3030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
引用
收藏
页码:332 / 365
页数:34
相关论文
共 179 条
  • [71] Distributed fine-tuning of CNNs for image retrieval on multiple mobile devices
    Jang, Gwangseon
    Lee, Jin-woo
    Lee, Jae-Gil
    Liu, Yunxin
    [J]. PERVASIVE AND MOBILE COMPUTING, 2020, 64
  • [72] Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks
    Hung, Shao-Chou
    Hsu, Hsiang
    Lien, Shao-Yu
    Chen, Kwang-Cheng
    [J]. IEEE ACCESS, 2015, 3 : 3019 - 3034
  • [73] Huurdeman Antona., 2003, The Worldwide History of Telecommunications. Evolution, DOI [10.1002/0471722243, DOI 10.1002/0471722243]
  • [74] Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
  • [75] Jain V., 2019, Recent Pat. Comput. Sci, V12, P611
  • [76] Fog Computing May Help to Save Energy in Cloud Computing
    Jalali, Fatemeh
    Hinton, Kerry
    Ayre, Robert
    Alpcan, Tansu
    Tucker, Rodney S.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (05) : 1728 - 1739
  • [77] SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application
    Jan, Mian Ahmad
    Zhang, Wenjing
    Usman, Muhammad
    Tan, Zhiyuan
    Khan, Fazlullah
    Luo, Entao
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 137 : 1 - 10
  • [78] Jang M, 2014, IEEE INFOCOM SER, P2220, DOI 10.1109/INFOCOM.2014.6848165
  • [79] Resource Efficient Mobile Computing using Cloudlet Infrastructure
    Jararweh, Yaser
    Tawalbeh, Lo'ai
    Ababneh, Fadi
    Dosari, Fand
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 373 - 377
  • [80] Juntunen Antero, 2010, Proceedings 2010 Ninth International Conference on Mobile Business/2010 Ninth Global Mobility Roundtable. ICMB-GMR 2010, P82, DOI 10.1109/ICMB-GMR.2010.69