4.7 Article

A survey of edge computing-based designs for IoT security

Journal

DIGITAL COMMUNICATIONS AND NETWORKS
Volume 6, Issue 2, Pages 195-202

Publisher

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2019.08.006

Keywords

Edge computing; Internet of Things (IoT); Security; Architecture; Secure protocols; Firewall; Intrusion detection; Authentication; Authorization; Privacy

Funding

  1. National Science Foundation [1723596]
  2. National Security Agency [H98230-17-1-0355]
  3. Direct For Education and Human Resources
  4. Division Of Graduate Education [1723596] Funding Source: National Science Foundation

Ask authors/readers for more resources

Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight into future research directions and open research issues.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available