Securing the IoT Edge Devices Using Advanced Digital Technologies
DOI:
https://doi.org/10.69955/ajoeee.2021.v1i2.69Keywords:
IoT, Edge computing, Cyberattacks, Artificial intelligence, Machine learningAbstract
As the IoT ecosystem continues to grow, edge computing is becoming essential for handling and analyzing the vast amount of data generated by connected devices. Unlike traditional centralized data models, where information is sent to remote centers for processing, edge computing processes data closer to where it is generated. This decentralized approach helps reduce latency, optimizes bandwidth usage, and improves both privacy and security. However, the rise in IoT devices and the spread of edge computing also increase the potential for cyberattacks, demanding more robust security measures. With AI and machine learning being utilized to analyze IoT data, edge computing facilitates this analysis directly at the data source, pointing to a future where AI and ML applications are more prevalent on edge devices.
Downloads
References
[1] J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, "Data security and privacy-preserving in edge computing paradigm: Survey and open issues," IEEE Access, vol. 6, pp. 18209-18237, 2018. https://doi.org/10.1109/ACCESS.2018.2820162
[2] M. A. Albreem, A. M. Sheikh, M. H. Alsharif, M. Jusoh, and M. N. Mohd Yasin, "Green internet of things (giot): Applications, practices, awareness, and challenges," IEEE Access, vol. 9, pp. 38833-38858, 2021. https://doi.org/10.1109/ACCESS.2021.3061697
[3] M. A. Albreem, A. M. Sheikh, M. J. Bashir, and A. A. El-Saleh, "Towards green internet of things (IoT) for a sustainable future in Gulf cooperation council countries: Current practices, challenges and future prospective," Wireless Networks, vol. 29, no. 2, pp. 539-567, 2023. https://doi.org/10.1007/s11276-022-03133-3
[4] M. A. M. Albreem, A. M. Sheikh, and A. A. El-Saleh, "Towards a sustainable environment with a green IoT: An overview," in 2022 International Conference on Computer Technologies (ICCTech), pp. 52-63, 2022. https://doi.org/10.1109/ICCTech55650.2022.00017
[5] P. M. Chanal and M. S. Kakkasageri, "Security and privacy in IoT: a survey," Wireless Personal Communications, vol. 115, no. 2, pp. 1667-1693, 2020. https://doi.org/10.1007/s11277-020-07649-9
[6] Sonicwall, "2023 sonicwall cyber threat report." https://www.sonicwall.com/medialibrary/en/white-paper/2023-cyber-threat-report.pdf/, 2023. accessed:2024-04-26.
[7] A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, "A survey on security and privacy issues in edge-computing assisted internet of things," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4004-4022, 2020. https://doi.org/10.1109/JIOT.2020.3015432
[8] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A survey on IoT security: application areas, security threats, and solution architectures," IEEE Access, vol. 7, pp. 82721-82743, 2019. https://doi.org/10.1109/ACCESS.2019.2924045
[9] L. Jose, "Exploring IoT security issues and solutions." https://www.deviceauthority.com/blog/exploring-iot-security-issues-and-solutions/, 2023. accessed:2024-04-27.
[10] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016. https://doi.org/10.1109/JIOT.2016.2579198
[11] W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, "A survey on the edge computing for the Internet of things," IEEE Access, vol. 6, pp. 6900-6919, 2017. https://doi.org/10.1109/ACCESS.2017.2778504
[12] G. Singh, "Edge computing: Benefits and challenges." https://www.synopsys.com/blogs/chip-design/edge-computing-benefits-and-challenges.html, 2022. accessed:2024-04-27.
[13] A. Pradeep, "Exploring the future of edge computing: Advantages, limitations, and opportunities," in International Conference on Advanced Communication and Intelligent Systems, pp. 196-209, Springer, 2023. https://doi.org/10.1007/978-3-031-45124-9_15
[14] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, "On multi-access edge computing: A survey of the emerging 5g network edge cloud architecture and orchestration," IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1657-1681, 2017. https://doi.org/10.1109/COMST.2017.2705720
[15] M. S. Ansari, S. H. Alsamhi, Y. Qiao, Y. Ye, and B. Lee, "Security of distributed intelligence in edge computing: Threats and countermeasures," The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing, pp. 95-122, 2020. https://doi.org/10.1007/978-3-030-41110-7_6
[16] S. A. Bhat, I. B. Sofi, and C.-Y. Chi, "Edge computing and its convergence with blockchain in 5g and beyond: Security, challenges, and opportunities," IEEE Access, vol. 8, pp. 205340-205373, 2020. https://doi.org/10.1109/ACCESS.2020.3037108
[17] Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, "Edge computing security: State of the art and challenges," Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, 2019. https://doi.org/10.1109/JPROC.2019.2918437
[18] S. Nirenjena and D. Baskaran, "An investigation on distributed denial of service attack in edge computing," in 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 668-675, 2023. https://doi.org/10.1109/ICSSIT55814.2023.10061128
[19] P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology-CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999, Proceedings 19, pp. 388-397, Springer, 1999. https://doi.org/10.1007/3-540-48405-1_25
[20] K. Alsubhi, "A secured intrusion detection system for mobile edge computing," Applied Sciences, vol. 14, no. 4, p. 1432, 2024. https://doi.org/10.3390/app14041432
[21] T. Sipola, J. Alatalo, T. Kokkonen, and M. Rantonen, "Artificial intelligence in the iot era: A review of edge ai hardware and software," in 2022 31st Conference of Open Innovations Association (FRUCT), pp. 320-331, IEEE, 2022. https://doi.org/10.23919/FRUCT54823.2022.9770931
[22] C. Surianarayanan, J. J. Lawrence, P. R. Chelliah, E. Prakash, and C. Hewage, "A survey on optimization techniques for edge artificial intelligence (ai)," Sensors, vol. 23, no. 3, p. 1279, 2023. https://doi.org/10.3390/s23031279
[23] Z. Chang, S. Liu, X. Xiong, Z. Cai, and G. Tu, "A survey of recent advances in edge-computing-powered artificial intelligence of things," IEEE Internet of Things Journal, vol. 8, no. 18, pp. 13849-13875, 2021. https://doi.org/10.1109/JIOT.2021.3088875
Downloads
Published
Issue
Section
License
Copyright (c) 2021 AlamBiblilo Publishers

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Asian Journal of Electrical and Electronic Engineering journal is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




