2020
DOI: 10.1016/j.dcan.2019.08.006
|View full text |Cite
|
Sign up to set email alerts
|

A survey of edge computing-based designs for IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
116
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 213 publications
(116 citation statements)
references
References 25 publications
0
116
0
Order By: Relevance
“…However, these researches only design their frameworks, and do not provide a detection algorithm nor performance evaluation for the designs. Authors in [6] also proposed an edge-centric architecture in contrast to the traditional layered architecture found in [9] and [10]. Our solution follows the latter model as we believe the Cloud centralization is necessary for the sake of application services, big data and model optimization.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, these researches only design their frameworks, and do not provide a detection algorithm nor performance evaluation for the designs. Authors in [6] also proposed an edge-centric architecture in contrast to the traditional layered architecture found in [9] and [10]. Our solution follows the latter model as we believe the Cloud centralization is necessary for the sake of application services, big data and model optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have proposed to use the advances of edge computing in the field of IoT security [6] due to the above-stated benefits. Security frameworks in [7]- [8] are examples of this.…”
Section: Related Workmentioning
confidence: 99%
“…Although considerable research has been conducted on security and privacy solutions for IoT devices [ 14 , 23 , 24 , 25 ], edge-based solutions for data security were also presented frequently in recent years [ 26 , 27 , 28 ], and specifically distributed blockchain-based solutions for data privacy. Since its early development, blockchain technology has been seen as a candidate to solve many of the security challenges that centralized data exchange models inherently have, due to its decentralized nature and full end-to-end encryption scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In this study, firewalls, intrusion detection systems, authentication, and authorization structures are discussed. (Sha et al, 2020). Hussain et al reviewed encryption and decryption techniques used for IoT security (Hussain and Abdullah 2018).…”
Section: Iot Securitymentioning
confidence: 99%