Securing the IoT Edge Devices Using Advanced Digital Technologies

Authors

DOI:

https://doi.org/10.69955/ajoeee.2021.v1i2.69

Keywords:

IoT, Edge computing, Cyberattacks, Artificial intelligence, Machine learning

Abstract

As the IoT ecosystem continues to grow, edge computing is becoming essential for handling and analyzing the vast amount of data generated by connected devices. Unlike traditional centralized data models, where information is sent to remote centers for processing, edge computing processes data closer to where it is generated. This decentralized approach helps reduce latency, optimizes bandwidth usage, and improves both privacy and security. However, the rise in IoT devices and the spread of edge computing also increase the potential for cyberattacks, demanding more robust security measures. With AI and machine learning being utilized to analyze IoT data, edge computing facilitates this analysis directly at the data source, pointing to a future where AI and ML applications are more prevalent on edge devices.

Metrics

Metrics Loading ...

Downloads

Download data is not yet available.

References

[1] J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, "Data security and privacy-preserving in edge computing paradigm: Survey and open issues," IEEE Access, vol. 6, pp. 18209-18237, 2018. https://doi.org/10.1109/ACCESS.2018.2820162 DOI: https://doi.org/10.1109/ACCESS.2018.2820162

[2] M. A. Albreem, A. M. Sheikh, M. H. Alsharif, M. Jusoh, and M. N. Mohd Yasin, "Green internet of things (giot): Applications, practices, awareness, and challenges," IEEE Access, vol. 9, pp. 38833-38858, 2021. https://doi.org/10.1109/ACCESS.2021.3061697 DOI: https://doi.org/10.1109/ACCESS.2021.3061697

[3] M. A. Albreem, A. M. Sheikh, M. J. Bashir, and A. A. El-Saleh, "Towards green internet of things (IoT) for a sustainable future in Gulf cooperation council countries: Current practices, challenges and future prospective," Wireless Networks, vol. 29, no. 2, pp. 539-567, 2023. https://doi.org/10.1007/s11276-022-03133-3 DOI: https://doi.org/10.1007/s11276-022-03133-3

[4] M. A. M. Albreem, A. M. Sheikh, and A. A. El-Saleh, "Towards a sustainable environment with a green IoT: An overview," in 2022 International Conference on Computer Technologies (ICCTech), pp. 52-63, 2022. https://doi.org/10.1109/ICCTech55650.2022.00017 DOI: https://doi.org/10.1109/ICCTech55650.2022.00017

[5] P. M. Chanal and M. S. Kakkasageri, "Security and privacy in IoT: a survey," Wireless Personal Communications, vol. 115, no. 2, pp. 1667-1693, 2020. https://doi.org/10.1007/s11277-020-07649-9 DOI: https://doi.org/10.1007/s11277-020-07649-9

[6] Sonicwall, "2023 sonicwall cyber threat report." https://www.sonicwall.com/medialibrary/en/white-paper/2023-cyber-threat-report.pdf/, 2023. accessed:2024-04-26.

[7] A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, "A survey on security and privacy issues in edge-computing assisted internet of things," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4004-4022, 2020. https://doi.org/10.1109/JIOT.2020.3015432 DOI: https://doi.org/10.1109/JIOT.2020.3015432

[8] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A survey on IoT security: application areas, security threats, and solution architectures," IEEE Access, vol. 7, pp. 82721-82743, 2019. https://doi.org/10.1109/ACCESS.2019.2924045 DOI: https://doi.org/10.1109/ACCESS.2019.2924045

[9] L. Jose, "Exploring IoT security issues and solutions." https://www.deviceauthority.com/blog/exploring-iot-security-issues-and-solutions/, 2023. accessed:2024-04-27.

[10] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016. https://doi.org/10.1109/JIOT.2016.2579198 DOI: https://doi.org/10.1109/JIOT.2016.2579198

[11] W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, "A survey on the edge computing for the Internet of things," IEEE Access, vol. 6, pp. 6900-6919, 2017. https://doi.org/10.1109/ACCESS.2017.2778504 DOI: https://doi.org/10.1109/ACCESS.2017.2778504

[12] G. Singh, "Edge computing: Benefits and challenges." https://www.synopsys.com/blogs/chip-design/edge-computing-benefits-and-challenges.html, 2022. accessed:2024-04-27.

[13] A. Pradeep, "Exploring the future of edge computing: Advantages, limitations, and opportunities," in International Conference on Advanced Communication and Intelligent Systems, pp. 196-209, Springer, 2023. https://doi.org/10.1007/978-3-031-45124-9_15 DOI: https://doi.org/10.1007/978-3-031-45124-9_15

[14] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, "On multi-access edge computing: A survey of the emerging 5g network edge cloud architecture and orchestration," IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1657-1681, 2017. https://doi.org/10.1109/COMST.2017.2705720 DOI: https://doi.org/10.1109/COMST.2017.2705720

[15] M. S. Ansari, S. H. Alsamhi, Y. Qiao, Y. Ye, and B. Lee, "Security of distributed intelligence in edge computing: Threats and countermeasures," The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing, pp. 95-122, 2020. https://doi.org/10.1007/978-3-030-41110-7_6 DOI: https://doi.org/10.1007/978-3-030-41110-7_6

[16] S. A. Bhat, I. B. Sofi, and C.-Y. Chi, "Edge computing and its convergence with blockchain in 5g and beyond: Security, challenges, and opportunities," IEEE Access, vol. 8, pp. 205340-205373, 2020. https://doi.org/10.1109/ACCESS.2020.3037108 DOI: https://doi.org/10.1109/ACCESS.2020.3037108

[17] Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, "Edge computing security: State of the art and challenges," Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, 2019. https://doi.org/10.1109/JPROC.2019.2918437 DOI: https://doi.org/10.1109/JPROC.2019.2918437

[18] S. Nirenjena and D. Baskaran, "An investigation on distributed denial of service attack in edge computing," in 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 668-675, 2023. https://doi.org/10.1109/ICSSIT55814.2023.10061128 DOI: https://doi.org/10.1109/ICSSIT55814.2023.10061128

[19] P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology-CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999, Proceedings 19, pp. 388-397, Springer, 1999. https://doi.org/10.1007/3-540-48405-1_25 DOI: https://doi.org/10.1007/3-540-48405-1_25

[20] K. Alsubhi, "A secured intrusion detection system for mobile edge computing," Applied Sciences, vol. 14, no. 4, p. 1432, 2024. https://doi.org/10.3390/app14041432 DOI: https://doi.org/10.3390/app14041432

[21] T. Sipola, J. Alatalo, T. Kokkonen, and M. Rantonen, "Artificial intelligence in the iot era: A review of edge ai hardware and software," in 2022 31st Conference of Open Innovations Association (FRUCT), pp. 320-331, IEEE, 2022. https://doi.org/10.23919/FRUCT54823.2022.9770931 DOI: https://doi.org/10.23919/FRUCT54823.2022.9770931

[22] C. Surianarayanan, J. J. Lawrence, P. R. Chelliah, E. Prakash, and C. Hewage, "A survey on optimization techniques for edge artificial intelligence (ai)," Sensors, vol. 23, no. 3, p. 1279, 2023. https://doi.org/10.3390/s23031279 DOI: https://doi.org/10.3390/s23031279

[23] Z. Chang, S. Liu, X. Xiong, Z. Cai, and G. Tu, "A survey of recent advances in edge-computing-powered artificial intelligence of things," IEEE Internet of Things Journal, vol. 8, no. 18, pp. 13849-13875, 2021. https://doi.org/10.1109/JIOT.2021.3088875 DOI: https://doi.org/10.1109/JIOT.2021.3088875

Downloads

Published

2024-10-02

Issue

Section

Articles

How to Cite

[1]
“Securing the IoT Edge Devices Using Advanced Digital Technologies”, AJoEEE, vol. 4, no. 2, pp. 52–60, Oct. 2024, doi: 10.69955/ajoeee.2021.v1i2.69.

Similar Articles

11-20 of 20

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)