4.5 Article

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

Journal

AD HOC NETWORKS
Volume 152, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.adhoc.2023.103322

Keywords

Edge computing; DDoS; Security; Vulnerabilities; Attacks

Ask authors/readers for more resources

This paper examines the impact of different types of DoS and DDoS attacks on edge computing layers and investigates existing detection and prevention mechanisms to address security weaknesses. Additionally, a theoretical architecture is proposed to mitigate the impact of distributed denial of service attacks on edge systems.
Edge computing has emerged as the dominant communication technology connecting IoT and cloud, offering reduced latency and harnessing the potential of edge devices. However, its widespread adoption has also introduced various security vulnerabilities, similar to any nascent technology. One notable threat is the denial of service (DoS) attack, including its distributed form, the distributed denial of service (DDoS) attack, which is the primary focus of this research. This paper aims to explore the impact of different types of DoS and DDoS attacks on edge computing layers by examining the vulnerabilities associated with various edge peripherals. Additionally, existing detection and prevention mechanisms are investigated to address these weaknesses. Furthermore, a theoretical architecture is proposed to mitigate distributed denial of service attacks targeting edge systems. By comprehensively analyzing and addressing the security concerns related to DoS and DDoS attacks in edge computing, this research aims to contribute to the development of robust and secure edge computing systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available