A Survey of Security Architectures for Edge Computing-Based IoT

被引:24
|
作者
Fazeldehkordi, Elahe [1 ]
Gronli, Tor-Morten [1 ]
机构
[1] Kristiania Univ Coll, Dept Technol, Mobile Technol Lab MOTEL, Kirkegata 24-26, N-0153 Oslo, Norway
来源
IOT | 2022年 / 3卷 / 03期
关键词
edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture; ASSISTED INTERNET; CLOUD; THINGS; FOG; EFFICIENT; PRIVACY; PLATFORM; ENERGY; SENSOR; TECHNOLOGIES;
D O I
10.3390/iot3030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
引用
收藏
页码:332 / 365
页数:34
相关论文
共 50 条
  • [41] STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT
    Zhang, Peiying
    Jiang, Chunxiao
    Pang, Xue
    Qian, Yi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2459 - 2467
  • [42] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [43] A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network
    Sindjoung, Miguel Landry Foko
    Velempini, Mthulisi
    Djamegni, Clementin Tayou
    ARRAY, 2023, 19
  • [44] Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
    Ahmad, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Baker, Thar
    Jalil, Zunera
    ELECTRONICS, 2022, 11 (01)
  • [45] Quantum Deep Reinforcement Learning for 6G Mobile Edge Computing-based IoT Systems
    Ansere, James Adu
    Duong, Trung Q.
    Khosravirad, Saeed R.
    Sharma, Vishal
    Masaracchia, Antonino
    Dobre, Octavia A.
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 406 - 411
  • [46] Hierarchical Security Paradigm for IoT Multiaccess Edge Computing
    Singh, Jaspreet
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Erbad, Aiman
    Mohamed, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5794 - 5805
  • [47] Hybrid IoT-Edge-Cloud Computing-based Athlete Healthcare Framework: Digital Twin Initiative
    Alsubai, Shtwai
    Sha, Mohemmed
    Alqahtani, Abdullah
    Bhatia, Munish
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (06): : 2056 - 2075
  • [48] Quantum Deep Reinforcement Learning for Dynamic Resource Allocation in Mobile Edge Computing-Based IoT Systems
    Ansere, James Adu
    Gyamfi, Eric
    Sharma, Vishal
    Shin, Hyundong
    Dobre, Octavia A.
    Duong, Trung Q.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (06) : 6221 - 6233
  • [49] A Lightweight iot Terminal security access authentication Method Based on edge Computing
    Zhou, Xiangfeng
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS AND ARTIFICIAL INTELLIGENCE, PEAI 2024, 2024, : 511 - 514
  • [50] Placement optimization of IoT security solutions for edge computing based on graph theory
    Godquin, Tanguy
    Barbier, Morgan
    Gaber, Chrystel
    Grimault, Jean-Luc
    Le Bars, Jean-Marie
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,