Security in edge-assisted Internet of Things: challenges and solutions

被引:13
|
作者
Shen, Shuaiqi [1 ]
Zhang, Kuan [1 ]
Zhou, Yi [2 ]
Ci, Song [3 ]
机构
[1] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Omaha, NE 68182 USA
[2] Henan Univ, Sch Comp & Informat Engn, Kaifeng 475001, Peoples R China
[3] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
关键词
Internet of Things; edge computing; network security; machine learning; data analytics; IOT; FOG;
D O I
10.1007/s11432-019-2906-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased latency. The development of IoT extends the computation-intensive applications from centralized servers to the edge of the network, promoting the paradigm of edge computing. Edge computing brings great assistance to IoT architecture by efficiently accomplishing tasks with lower latency, less energy consumption and reduced network bandwidth. Edge-assisted IoT emerges to provide location-aware services and offload computational tasks to edge nodes near the IoT devices. However, a series of security challenges still exist in edge-assisted IoT owing to the inherent vulnerabilities of edge nodes and sensitive nature of the collected data. Among the emerging and existing security schemes in IoT applications, security and energy consumption are two overriding yet conflicting requirements. The tradeoff between security and energy is critical to the sustainability of the IoT ecosystem but still lacks sufficient discussion. In this article, we investigate the security challenges in edge-assisted IoT and how the constraints in energy consumption can affect the design of security schemes. Specifically, we firstly present the architecture of edge-assisted IoT and its unique characteristics. Secondly, we identify the security threats in the edge-assisted IoT applications and the security-energy tradeoff during implementation. Thirdly, in a case study of distributed denial of service (DDoS) and malware injection attack, we propose a preliminary solution to address the conflict between security and energy requirements. Finally, we discuss some open issues and identify future research directions for security and energy efficiency in edge-assisted IoT.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Security in edge-assisted Internet of Things:challenges and solutions
    Shuaiqi SHEN
    Kuan ZHANG
    Yi ZHOU
    Song CI
    [J]. Science China(Information Sciences), 2020, 63 (12) : 27 - 40
  • [2] Security in edge-assisted Internet of Things: challenges and solutions
    Shuaiqi Shen
    Kuan Zhang
    Yi Zhou
    Song Ci
    [J]. Science China Information Sciences, 2020, 63
  • [3] Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol
    Wang, Xiangyang
    Gu, Chunxiang
    Wei, Fushan
    Lu, Siqi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE NETWORK, 2019, 33 (02): : 50 - 57
  • [5] Analysis on cascading reliability of edge-assisted Internet of Things
    Fu, Xiuwen
    Wang, Ye
    Yang, Yongsheng
    Postolache, Octavian
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 223
  • [6] An edge-assisted group authentication scheme for the narrowband internet of things
    Zhao, Guosheng
    Chen, Huan
    Wang, Jian
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (05) : 6597 - 6618
  • [7] Edge-Assisted CNN Inference over Encrypted Data for Internet of Things
    Tian, Yifan
    Yuan, Jiawei
    Yu, Shucheng
    Hou, Yantian
    Song, Houbing
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 85 - 104
  • [8] A Review on the Security of the Internet of Things: Challenges and Solutions
    Oludare Isaac Abiodun
    Esther Omolara Abiodun
    Moatsum Alawida
    Rami S. Alkhawaldeh
    Humaira Arshad
    [J]. Wireless Personal Communications, 2021, 119 : 2603 - 2637
  • [9] Internet of Things: Architecture, Security challenges and Solutions
    Al Hinai, Siham
    Singh, Ajay Vikram
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 198 - +
  • [10] Security in Internet of Things: Issues, Challenges and Solutions
    Aldowah, Hanan
    Ul Rehman, Shafiq
    Umar, Irfan
    [J]. RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 396 - 405