<tt id="ukqso"></tt>
<acronym id="ukqso"><wbr id="ukqso"></wbr></acronym>
<object id="ukqso"><tr id="ukqso"></tr></object><object id="ukqso"><noscript id="ukqso"></noscript></object>
文章摘要
Kewei Sha,T. Andrew Yang,Wei Wei,Sadegh Davari.[J].重慶郵電大學新辦英文刊,2020,(2):195-202
下載全文  View/Add Comment  Download reader
A survey of edge computing-based designs for IoT security
Received: December 05, 2018  Revised: April 16, 2019
DOI:https://doi.org/10.1016/j.dcan.2019.08.006
中文關鍵詞: 
英文關鍵詞: Edge computing;Internet of Things (IoT);Security;Architecture;Secure protocols;Firewall;Intrusion detection;Authentication;Authorization;Privacy
基金項目:
AuthorInstitutionE-mail
Kewei Sha Department of Computing Sciences, University of Houston-Clear Lake, Houston, 77058, USA sha@uhcl.edu 
T. Andrew Yang Department of Computing Sciences, University of Houston-Clear Lake, Houston, 77058, USA  
Wei Wei Department of Computing Sciences, University of Houston-Clear Lake, Houston, 77058, USA  
Sadegh Davari Department of Computing Sciences, University of Houston-Clear Lake, Houston, 77058, USA  
Hits: 68
Download times: 102
中文摘要:
      
英文摘要:
      Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight into future research directions and open research issues.
荣耀棋牌下载