Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
125 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things (2008.03252v1)

Published 5 Aug 2020 in cs.NI and cs.CR

Abstract: Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art centralized cloud computing paradigm due to the bandwidth and resources scarcity. Hence, edge computing (EC) is emerging as an innovative strategy that brings data processing and storage near to the end users, leading to what is called EC-assisted IoT. Although this paradigm provides unique features and enhanced quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.

Citations (202)

Summary

  • The paper presents a multi-layered categorization of security functions and explores countermeasures for EC-assisted IoT.
  • It analyzes a range of attacks including DDoS, data sniffing, and malicious injections while advocating blockchain and SDN solutions.
  • It identifies the need for lightweight protocols and unified policies to secure resource-constrained edge IoT environments.

Overview of Security and Privacy Issues in Edge Computing-Assisted IoT

The paper "A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things" offers an exhaustive paper tackling the security and privacy challenges associated with the burgeoning paradigm of Edge Computing (EC) integrated into the Internet of Things (IoT). Its discourse reflects the imperative necessity for enhancing processing capabilities at the network's periphery, proving a pivotal element in sustaining the massive IoT device proliferation and data production without overburdening centralized cloud infrastructures. While EC offers significant improvements in latency, flexibility, and network security—extending the scope and efficiency of IoT applications—these enhancements carry an inherent escalation in security and privacy risks.

Structure and Contributions

The paper methodically delineates its contents into several segments: foundational elements of EC-assisted IoT, the nature and typology of security and privacy attacks, the countermeasures available, and future challenges. Initially, it defines the scope and architecture of EC-assisted IoT systems, succinctly outlining their advantages and intrinsic challenges. Followed by a detailed explication of existing security and privacy concerns, it classifies potential attacks into categories such as malicious software/hardware injections, DDoS, and data sniffing. Alongside, it furnishes a spectrum of countermeasures, from cryptographic techniques to the implementation of IDS frameworks.

A significant contribution of the paper resides in its multi-layered approach to categorizing security functions such as authentication, access control, data security, trust modeling, and privacy. It further explores the integration of novel technologies such as blockchain and SDN to reinforce security frameworks, showcasing innovative pathways for future research.

Key Findings and Implications

Central to the paper's discussion are EC's role in reducing latency and bandwidth usage and the security implications of placing data and processing closer to IoT devices. The paper identifies how the dispersion of data across numerous edge nodes, though reducing the load on central cloud servers, simultaneously heightens exposure to cyber threats.

The array of solutions and countermeasures presented underscores the plethora of approaches required to mitigate identified risks. These range from traditional cryptographic methods and IDS to emerging technologies such as blockchain, which promise improvements in decentralized trust management.

Future Directions

The paper extensively elaborates on open challenges, which demand research into lightweight security protocols tailored to resource-constrained IoT edge devices. It advocates for developing comprehensive trust management frameworks, allowing seamless yet secure communication in highly dynamic, heterogeneous EC-assisted IoT architectures.

Moreover, it highlights the significance of formulating standardized policies and unified security platforms to enhance interoperability and integrity across diverse IoT ecosystems. The adaptation of machine learning to identify and respond to threats in real-time represents another promising direction, facilitating intelligent, adaptive security solutions.

Conclusion

In sum, this survey rigorously explores the potential security and privacy challenges etched within the EC-assisted IoT paradigm, providing a profound foundation for contemporary concerns amidst its integration. By illuminating current shortcomings and pressing future research areas, it paves the way for advancing secure, efficient EC-assisted IoT networks.