A survey on various security protocols of edge computing

被引:0
作者
Bhattacharya, Tathagata [1 ]
Peddi, Adithya Vardhan [1 ]
Ponaganti, Srikanth [1 ]
Veeramalla, Sai Teja [1 ]
机构
[1] Auburn Univ, Montgomery, AL 36117 USA
关键词
Edge computing; SQL injection; Threat detection; Attack prevention; Input sanitization; Real-time attacks; Edge; Device vulnerabilities; iFogSim; Edge network simulation; OF-THE-ART; SEARCHABLE ENCRYPTION; RESOURCE-MANAGEMENT; DATA INTEGRITY; IOT; INTERNET; CLOUD; PRIVACY; THINGS; BLOCKCHAIN;
D O I
10.1007/s11227-024-06678-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and prevention of cyberattacks. This paper gives a comprehensive evaluation of the edge security landscape in peripheral computing, with specialized expertise in identifying and mitigating various types of attacks. We explore the challenges associated with detecting and preventing attacks in edge computing environments, acknowledging the limitations of existing approaches. One of the very interesting novelties that we include in this survey article is, that we designed a Web application that runs on an edge network and simulates SQL injection attacks-a common threat in edge computing. Through this simulation, we examined every one of the cleanup strategies used to discover and prevent such attacks using input sanitization techniques, ensuring that the malicious SQL code turned neutralized. Our studies contribute to deeper know-how of the security landscape in edge computing by providing meaningful insights into the effectiveness of multiple prevention strategies.
引用
收藏
页数:77
相关论文
共 358 条
  • [1] Aamir M, 2014, Arxiv, DOI arXiv:1401.6317
  • [2] Identifying cyber threats to mobile-loT applications in edge computing paradigm
    Abawajy, Jemal
    Huda, Shamsul
    Sharmeen, Shaila
    Hassan, Mohammad Mehedi
    Almogren, Ahmad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 525 - 538
  • [3] Edge Computing for Smart Health: Context-Aware Approaches, Opportunities, and Challenges
    Abdellatif, Alaa Awad
    Mohamed, Amr
    Chiasserini, Carla Fabiana
    Tlili, Mounira
    Erbad, Aiman
    [J]. IEEE NETWORK, 2019, 33 (03): : 196 - 203
  • [4] Abi BA, 2024, Web sql injection attack detection algorithm using deep learning
  • [5] Abirami J, 2015, 2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC)
  • [6] Blockchain Applications - Usage in Different Domains
    Abou Jaoude, Joe
    Saade, Raafat George
    [J]. IEEE ACCESS, 2019, 7 : 45360 - 45381
  • [7] Abrams L., 2024, The biggest cybersecurity and cyberattack stories of 2023
  • [8] Deep learning-enabled anomaly detection for IoT systems
    Abusitta, Adel
    de Carvalho, Glaucio H. S.
    Wahab, Omar Abdel
    Halabi, Talal
    Fung, Benjamin C. M.
    Al Mamoori, Saja
    [J]. INTERNET OF THINGS, 2023, 21
  • [9] Ahamed J, 2016, INT C ELECT DEVICE S
  • [10] Ahmadi Fardin, 2021, Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), P172, DOI 10.1109/INDIACom51348.2021.00031