2020
DOI: 10.1109/access.2020.3037108
|View full text |Cite
|
Sign up to set email alerts
|

Edge Computing and Its Convergence With Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(16 citation statements)
references
References 158 publications
(194 reference statements)
0
16
0
Order By: Relevance
“…A key responsibility in safeguarding customers’ secrets and upholding the confidence involved, especially at the Edge network, should be rendered, e.g., a digitalized building constructed with many IoT devices, which can be a prime target due to its huge quantity of personal data produced. Therefore, a more regarded approach to protect the privacy of customers and gain their confidence is to make sure that data processing occurs at the Edge network or node of the house [ 68 ].…”
Section: Security and Privacy Of Computing Paradigmsmentioning
confidence: 99%
“…A key responsibility in safeguarding customers’ secrets and upholding the confidence involved, especially at the Edge network, should be rendered, e.g., a digitalized building constructed with many IoT devices, which can be a prime target due to its huge quantity of personal data produced. Therefore, a more regarded approach to protect the privacy of customers and gain their confidence is to make sure that data processing occurs at the Edge network or node of the house [ 68 ].…”
Section: Security and Privacy Of Computing Paradigmsmentioning
confidence: 99%
“…However, the authors introduced nonautonomous device registration and management overhead that may not scale well on large deployments. Bhat et al [33] created a comprehensive overview of different research challenges of edge computing along with security issues and current mitigations. They also identified the challenges, impact, and risks associated with integrating blockchain into edge computing.…”
Section: A Edge Computingmentioning
confidence: 99%
“…Moreover, the total consumption of energy is high for edge devices in a public blockchain. However, Bhat et al [33] also demonstrated that permissioned blockchains significantly reduce the requirements for processing and storage. Accordingly, the authors have proposed the integration of blockchain into edge computing in the future.…”
Section: Edge Computingmentioning
confidence: 99%
“…Overall, additional linked intelligence within a telecommunication network characterized by ML/AI technologies alongside advanced networking constitutes the main driver in sixth generation vision. Nevertheless, the alliance involving 6G and AI may also act as a doubleedged sword in numerous scenarios while seeking for infringing or protecting privacy and security [13].…”
Section: Figure 1: Wireless Security Landscapes' Evolution From 4g To 6gmentioning
confidence: 99%
“…Centralized cloud computing has become complex to fulfill several quality-of-service (QoS) demands of different applications due to the drastic rise in the quantity of IIoT/IoT devices [12]. The introduction of edge computing is intended to enhance proximity between computation tasks and computational capability, and in turn preserve bandwidth resources and decrease network latency [13].…”
Section: B Edge Computingmentioning
confidence: 99%