Open Access Open Access  Restricted Access Subscription Access

IoT-based Edge Computing Will Breach Data or Make Life Simpler

Bijendra Singh Khangarot, Abhishek Dadhich

Abstract


Security is critical in today’s world since we have sensitive and confidential data that we do not want to share with anyone, yet adversaries attack our data and steal our identities. Similarly, with Internet of things (IoT), attackers attack devices or communication networks and steal data. Regardless of the source of the data, most current systems for cloud-supported, edge-data analytics employ rigorous bottom-up analytics approaches. Data are frequently generated at the infrastructure’s edge and then moved to the cloud, where traditional data analytics techniques are used. With the increase in fog computing and related edge computing paradigms such as multi-access edge computing (MEC) and cloudlet, possible solutions for coping with the massive volume of security-critical and time-sensitive data created by IoT are emerging. With this article, we will go through all of the dangers and security challenges in IoT.


Keywords


Edge computing, IoT, security introduction, MEC, authentication, data breach

Full Text:

PDF

References


Khan R, Khan SU, Zaheer R, Khan S. Future internet: the internet of things architecture, possible applications and key challenges. In 2012 10th international conference on frontiers of information technology 2012 Dec 17 (pp. 257–260). IEEE.

Li Y, Hou M, Liu H, Liu Y. Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things. Information Technology and Management. 2012 Dec; 13 (4): 205–16.

Yu W, Xu H, Zhang H, Griffith D, Golmie N. Ultra-dense networks: Survey of state of the art and future directions. In 2016 25th nternational conference on computer communication and networks (ICCCN) 2016 Aug 1 (pp. 1–10). IEEE.

Agiwal M, Roy A, Saxena N. Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials. 2016 Feb 19; 18 (3): 1617–55.

Zaharia M, Chowdhury M, Franklin MJ, Shenker S, Stoica I. Spark: Cluster computing with working sets. In2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10) 2010.

Ashton K. That ‘internet of things’ thing. RFID journal. 2009 Jun 22; 22 (7): 97–114.

Sundmaeker H, Guillemin P, Friess P, Woelfflé S. Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things, European Commision. 2010 Mar 3; 3 (3): 34–6.

Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems. 2013 Sep 1; 29 (7): 1645–60.

Index CG, Index CC. Forecast and methodology, 2016–2021; white paper; cisco systems. Inc.: San Jose, CA, USA. 2017.

CISCO.Cisco Annual Internet Report (2018–2023) White Paper [Online].Available from https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html




DOI: https://doi.org/10.37591/joces.v12i2.940

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Communication Engineering & Systems