2020
DOI: 10.1007/s11432-019-2906-y
|View full text |Cite
|
Sign up to set email alerts
|

Security in edge-assisted Internet of Things: challenges and solutions

Abstract: The flourish of 5th generation wireless systems (5G) network has brought numerous benefits to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased latency. The development of IoT extends the computation-intensive applications from centralized servers to the edge of the network, promoting the paradigm of edge computing. Edge computing brings great assistance to IoT architecture by efficiently accomplishing tasks with lower latency, less energy consumption and reduced netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
7
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 23 publications
0
7
0
2
Order By: Relevance
“…Many universities were infected and severely spreads to large public service areas such as airports, customs, and public safety networks [4]. In view of the weak security protection mechanism and limited computing resources of edge computing nodes, the detection and prevention of malicious code in the entire life cycle of edge computing is of great significance [5]. Malicious code classification is the key to preventing malicious code from running and improving information security and provides an important basis for malicious code detection, control, and removal.…”
Section: Introductionmentioning
confidence: 99%
“…Many universities were infected and severely spreads to large public service areas such as airports, customs, and public safety networks [4]. In view of the weak security protection mechanism and limited computing resources of edge computing nodes, the detection and prevention of malicious code in the entire life cycle of edge computing is of great significance [5]. Malicious code classification is the key to preventing malicious code from running and improving information security and provides an important basis for malicious code detection, control, and removal.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy issues in control systems are getting more and more attention from both industry and research. In recent years, information technology and artificial intelligence technology are being increasingly employed in emerging applications such as the Internet-of-Things [1], cloud-based control systems, smart buildings, autonomous vehicles, and 5G networks. The ubiquitous employment of such technologies provides more ways for an adversary to access sensitive information (e.g., eavesdropping on a communication channel, hacking into an information processing center, or colluding with participants in a system); therefore, the risk of privacy leakage is rapidly increasing.…”
mentioning
confidence: 99%
“…另一方面, 未来物联网应用将涉及更多具有更高安全级别的用户隐私信息, 使其面临着比传统通 信系统更严峻的安全挑战 [10] . 如电子医疗保健、智能家居及智能交通等物联网服务会收集和管理用 户的私人信息, 遭受着被恶意攻击者窃听和篡改的风险 [11] , 一旦发生用户信息泄露将导致严重的后果. 以往通信系统主要依靠上层加密机制为信息传输提供安全保障, 然而在 IoT 系统中应用上层加密机制 将面临不可忽视的客观挑战.…”
unclassified
“…首先, 未来 IoT 应用部署的海量终端将形成高度动态的异构网络, 给统 一的密钥管理、协商、分发和更新带来困难 [12] . 其次, 传统保密机制需要进行频繁的信令交互, 对于 以短促频发为特征的短包通信而言传输开销过大, 无法适应 IoT 节点资源受限的现状 [11,13,14] . 最后, IoT 节点通常使用轻量级保密协议, 以牺牲系统的可靠性甚至安全性为代价交换较低的资源需求 [15] .…”
unclassified