4.7 Article

A survey of edge computing-based designs for IoT security

期刊

DIGITAL COMMUNICATIONS AND NETWORKS
卷 6, 期 2, 页码 195-202

出版社

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2019.08.006

关键词

Edge computing; Internet of Things (IoT); Security; Architecture; Secure protocols; Firewall; Intrusion detection; Authentication; Authorization; Privacy

资金

  1. National Science Foundation [1723596]
  2. National Security Agency [H98230-17-1-0355]
  3. Direct For Education and Human Resources
  4. Division Of Graduate Education [1723596] Funding Source: National Science Foundation

向作者/读者索取更多资源

Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight into future research directions and open research issues.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据