期刊
DIGITAL COMMUNICATIONS AND NETWORKS
卷 6, 期 2, 页码 195-202出版社
KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2019.08.006
关键词
Edge computing; Internet of Things (IoT); Security; Architecture; Secure protocols; Firewall; Intrusion detection; Authentication; Authorization; Privacy
资金
- National Science Foundation [1723596]
- National Security Agency [H98230-17-1-0355]
- Direct For Education and Human Resources
- Division Of Graduate Education [1723596] Funding Source: National Science Foundation
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight into future research directions and open research issues.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据