Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  IoT  /  Vol: 3 Par: 3 (2022)  /  Artículo
ARTÍCULO
TITULO

A Survey of Security Architectures for Edge Computing-Based IoT

Elahe Fazeldehkordi and Tor-Morten Grønli    

Resumen

The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.

 Artículos similares

       
 
Ricardo Martins Gonçalves, Miguel Mira da Silva and Paulo Rupino da Cunha    
The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal. Eur... ver más
Revista: Future Internet

 
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet

 
Maria Perifanou, Anastasios A. Economides and Stavros A. Nikou    
The integration of augmented reality (AR) in education is promising since it enhances teaching and offers more engaging and appealing learning experiences. Teachers can have a catalytic role towards the adoption of AR in education; therefore, their persp... ver más
Revista: Future Internet

 
Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy    
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by provi... ver más
Revista: Future Internet

 
Ronald Maharaj, Sushil Kumar, Nicholas Rollings and Andreas Antoniou    
A geophysical method, electrical resistivity tomography, was applied to identify potential groundwater-bearing zones around Nubutautau village on Viti Levu island, Fiji. Apparent resistivity data of the subsurface were collected through an electrode asse... ver más
Revista: Water