
Future Internet, Journal Year: 2025, Volume and Issue: 17(4), P. 175 - 175
Published: April 16, 2025
Edge computing (EC) is a distributed approach to processing data at the network edge, either by device or local server, instead of centralized centers cloud. EC proximity source can provide faster insights, response time, and bandwidth utilization. However, architecture makes it vulnerable security breaches diverse attack vectors. The edge paradigm has limited availability resources like memory battery power. Also, heterogeneous nature hardware, communication protocols, difficulty in timely updating patches exist. A significant number researchers have presented countermeasures for detection mitigation threats an paradigm. that differs from traditional privacy-preserving mechanisms already used cloud required. Artificial Intelligence (AI) greatly improves through advanced threat detection, automated responses, optimized resource management. When combined with Physical Unclonable Functions (PUFs), AI further strengthens leveraging PUFs’ unique unclonable attributes alongside AI’s adaptive efficient management features. This paper investigates various strategies cutting-edge solutions. It presents comparison between existing strategies, highlighting their benefits limitations. Additionally, offers detailed discussion threats, including characteristics classification different types. also provides overview privacy needs EC, detailing technological methods employed address threats. Its goal assist future pinpointing potential research opportunities.
Language: Английский