A Survey of Security Architectures for Edge Computing-Based IoT

被引:33
作者
Fazeldehkordi, Elahe [1 ]
Gronli, Tor-Morten [1 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Mobile Technol Lab MOTEL, Kirkegata 24-26, N-0153 Oslo, Norway
来源
IOT | 2022年 / 3卷 / 03期
关键词
edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture; ASSISTED INTERNET; CLOUD; THINGS; FOG; EFFICIENT; PRIVACY; PLATFORM; ENERGY; SENSOR; TECHNOLOGIES;
D O I
10.3390/iot3030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
引用
收藏
页码:332 / 365
页数:34
相关论文
共 179 条
[71]  
Hu Y. Ch., 2015, Mobile Edge Computing A key technology towards 5G
[72]   Toward self-organized mobile ad hoc networks: The terminodes project [J].
Hubaux, LP ;
Gross, T ;
Le Boudec, LY ;
Vetterli, M .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (01) :118-124
[73]  
Huerta-Canepa G., 2010, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing Services: Social Networks and Beyond, P6
[74]   Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks [J].
Hung, Shao-Chou ;
Hsu, Hsiang ;
Lien, Shao-Yu ;
Chen, Kwang-Cheng .
IEEE ACCESS, 2015, 3 :3019-3034
[75]  
Huurdeman Antona., 2003, The Worldwide History of Telecommunications. Evolution, DOI [DOI 10.1002/0471722243, 10.1002/0471722243]
[76]  
Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
[77]  
Jain V., 2019, Recent Pat. Comput. Sci, V12, P611
[78]   Fog Computing May Help to Save Energy in Cloud Computing [J].
Jalali, Fatemeh ;
Hinton, Kerry ;
Ayre, Robert ;
Alpcan, Tansu ;
Tucker, Rodney S. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (05) :1728-1739
[79]   SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application [J].
Jan, Mian Ahmad ;
Zhang, Wenjing ;
Usman, Muhammad ;
Tan, Zhiyuan ;
Khan, Fazlullah ;
Luo, Entao .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 137 :1-10
[80]  
Jang M, 2014, IEEE INFOCOM SER, P2220, DOI 10.1109/INFOCOM.2014.6848165