TY - GEN
T1 - Multi-level Security Threats Projection in Edge Computing
AU - Kanungo, Arpit
AU - Mohanty, Priyansu
AU - Mishra, Sushruta
AU - Rathore, Rajkumar Singh
AU - Abood, Baydaa Sh Z.
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024/10/4
Y1 - 2024/10/4
N2 - In the present world, almost all devices are connected over the Internet. This research paper highlights the advantages of edge computing, such as reduced data transmission, improved security and privacy, and increased application dependability. However, it also explores the risks and vulnerabilities associated with edge cybersecurity, including compromised centrally stored data, password policies in edge devices, and challenges in tracking and monitoring IoT traffic and analyzing various attacks like password attack, MITM attack, malware injection, etc. The paper also presents a statistical representation of a survey conducted in various sectors, highlighting the importance of security for edge computing use cases. It also reviews the existing literature on edge computing security, discussing topics such as data security and privacy, cryptography-based techniques, CDN, RTEM systems, Multi-Access EC and security measures in IoT. There is a statistical comparison of the proposed model and how it can have an edge over other techniques or systems. This paper then, concludes by emphasizing the importance of maintaining strong security measures in edge computing and the selection of model can depend upon the individual or company based on their requirements.
AB - In the present world, almost all devices are connected over the Internet. This research paper highlights the advantages of edge computing, such as reduced data transmission, improved security and privacy, and increased application dependability. However, it also explores the risks and vulnerabilities associated with edge cybersecurity, including compromised centrally stored data, password policies in edge devices, and challenges in tracking and monitoring IoT traffic and analyzing various attacks like password attack, MITM attack, malware injection, etc. The paper also presents a statistical representation of a survey conducted in various sectors, highlighting the importance of security for edge computing use cases. It also reviews the existing literature on edge computing security, discussing topics such as data security and privacy, cryptography-based techniques, CDN, RTEM systems, Multi-Access EC and security measures in IoT. There is a statistical comparison of the proposed model and how it can have an edge over other techniques or systems. This paper then, concludes by emphasizing the importance of maintaining strong security measures in edge computing and the selection of model can depend upon the individual or company based on their requirements.
KW - CDN
KW - Cyptography-based
KW - Edge computing
KW - Edge cybersecurity
KW - Malware injection
KW - Multi-access EC
KW - RTEM
UR - http://www.scopus.com/inward/record.url?scp=85206442978&partnerID=8YFLogxK
U2 - 10.1007/978-981-97-6036-7_15
DO - 10.1007/978-981-97-6036-7_15
M3 - Conference contribution
AN - SCOPUS:85206442978
SN - 9789819760350
T3 - Lecture Notes in Networks and Systems
SP - 173
EP - 185
BT - Proceedings of 5th Doctoral Symposium on Computational Intelligence - DoSCI 2024
A2 - Swaroop, Abhishek
A2 - Kansal, Vineet
A2 - Fortino, Giancarlo
A2 - Hassanien, Aboul Ella
PB - Springer Science and Business Media Deutschland GmbH
T2 - 5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
Y2 - 10 May 2024 through 10 May 2024
ER -