2023
DOI: 10.1109/jiot.2023.3304318
|View full text |Cite
|
Sign up to set email alerts
|

The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective

Cheng Wang,
Zenghui Yuan,
Pan Zhou
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 141 publications
0
2
0
Order By: Relevance
“…Li et al [17] introduced a cooperative defense framework for defending against DDoS attacks in mobile edge computing, which could adapt to traffic changes by automatically coordinating container-carrying defense resources among the edge nodes. Myneni et al [18] proposed a distributed deep defense framework by using edge computing approaches, which could detect and mitigate DDoS attacks near the data source; this defense framework could significantly reduce unnecessary bandwidth consumed by DDoS traffic going from edge network to edge network.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [17] introduced a cooperative defense framework for defending against DDoS attacks in mobile edge computing, which could adapt to traffic changes by automatically coordinating container-carrying defense resources among the edge nodes. Myneni et al [18] proposed a distributed deep defense framework by using edge computing approaches, which could detect and mitigate DDoS attacks near the data source; this defense framework could significantly reduce unnecessary bandwidth consumed by DDoS traffic going from edge network to edge network.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy concerns arise as personal and sensitive data may be processed locally. Implementing strong encryption, secure communication protocols, and access controls becomes essential to safeguard data integrity and confidentiality [186]- [190]. Furthermore, privacy-preserving techniques must be integrated into edge analytics to ensure responsible handling of information, considering regulatory requirements and user expectations.…”
Section: Security and Privacy In Edge Computingmentioning
confidence: 99%