2022 17th Iberian Conference on Information Systems and Technologies (CISTI) 2022
DOI: 10.23919/cisti54924.2022.9820159
|View full text |Cite
|
Sign up to set email alerts
|

IoT security issues in the context of Edge Computing: A Systematic Review of Literature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Their study delves into the evolution of these paradigms, highlighting the role of fog, edge, mist, and dew computing in addressing challenges like bandwidth limitation, high response time, and resource demands of latencysensitive applications. Torres-Carrión et al (2022) focus on the security issues in the context of edge computing, particularly within IoT environments. Their systematic literature review identifies various security problems that are prevalent in edge computing scenarios, emphasizing the need for in-depth security measures in these new computing paradigms.…”
Section: In-depth Analysis Of Edge Computing Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Their study delves into the evolution of these paradigms, highlighting the role of fog, edge, mist, and dew computing in addressing challenges like bandwidth limitation, high response time, and resource demands of latencysensitive applications. Torres-Carrión et al (2022) focus on the security issues in the context of edge computing, particularly within IoT environments. Their systematic literature review identifies various security problems that are prevalent in edge computing scenarios, emphasizing the need for in-depth security measures in these new computing paradigms.…”
Section: In-depth Analysis Of Edge Computing Technologiesmentioning
confidence: 99%
“…These tools play a crucial role in analyzing and optimizing the performance of fog and edge computing systems. Torres-Carrión et al (2022) highlight that the decentralized architecture and geographical distribution of edge computing contribute to the occurrence of security attacks. This insight is critical for developing robust security frameworks that can protect data and maintain user privacy in edge computing environments.…”
Section: In-depth Analysis Of Edge Computing Technologiesmentioning
confidence: 99%