2023
DOI: 10.1109/access.2023.3262614
|View full text |Cite
|
Sign up to set email alerts
|

Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective

Abstract: Developing a secured information processing environment highly depends on securing all of the layers and devices in the environment. Edge/Fog computing environments are not an exception in this case, and the security of those environments highly depends on securing the Internet of Things (IoT) devices which are the most vulnerable devices through the environment. The adoption of Edge/Fog computing paradigms by new emerging technologies stimulated malware development for IoT platforms. Recent attacks initiated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…Unlike traditional networks, which send data to a centralized location for processing, edge networks process data at the edge of the network, either on a device or in a nearby router or switch. This approach speeds up data processing and reduces latency, making it ideal for the IoT, self-driving cars, and smart cities [17], [111]. Like other computer networks, edge networks are susceptible to malware.…”
Section: J Attack Trends On Edge Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Unlike traditional networks, which send data to a centralized location for processing, edge networks process data at the edge of the network, either on a device or in a nearby router or switch. This approach speeds up data processing and reduces latency, making it ideal for the IoT, self-driving cars, and smart cities [17], [111]. Like other computer networks, edge networks are susceptible to malware.…”
Section: J Attack Trends On Edge Networkmentioning
confidence: 99%
“…Common attack trends in edge networks include Distributed Denial of Service (DDoS) attacks, data breaches, and man-in-the-middle attacks. These attacks aim to disrupt network operations, compromise sensitive data, or intercept communication between users and edge devices [17].…”
Section: J Attack Trends On Edge Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Another important aspect of the IoT environment is the threat of malware. Studies have characterized 64 IoT malware families, analyzing their behaviors, target architecture, target devices, delivery methods, attack vectors, persistence techniques, and evolution [13,14,15]. Finally, the emergence of Narrowband of Internet of Things (NB-IoT) has significantly contributed to the evolution of IoT towards intelligence, convenience, low power consumption, large connectivity, and wide coverage [?,16].…”
Section: Introductionmentioning
confidence: 99%
“…Another gap in the current academic literature is the lack of consistent methodology for studying PDoS attacks. Individual studies are often constrained by their own scope, which may be limited to specific types or categories of attacks, and only mention the possibility of PDoS [13,14].…”
Section: Introductionmentioning
confidence: 99%