A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies DOI Creative Commons
Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi

et al.

Future Internet, Journal Year: 2025, Volume and Issue: 17(4), P. 175 - 175

Published: April 16, 2025

Edge computing (EC) is a distributed approach to processing data at the network edge, either by device or local server, instead of centralized centers cloud. EC proximity source can provide faster insights, response time, and bandwidth utilization. However, architecture makes it vulnerable security breaches diverse attack vectors. The edge paradigm has limited availability resources like memory battery power. Also, heterogeneous nature hardware, communication protocols, difficulty in timely updating patches exist. A significant number researchers have presented countermeasures for detection mitigation threats an paradigm. that differs from traditional privacy-preserving mechanisms already used cloud required. Artificial Intelligence (AI) greatly improves through advanced threat detection, automated responses, optimized resource management. When combined with Physical Unclonable Functions (PUFs), AI further strengthens leveraging PUFs’ unique unclonable attributes alongside AI’s adaptive efficient management features. This paper investigates various strategies cutting-edge solutions. It presents comparison between existing strategies, highlighting their benefits limitations. Additionally, offers detailed discussion threats, including characteristics classification different types. also provides overview privacy needs EC, detailing technological methods employed address threats. Its goal assist future pinpointing potential research opportunities.

Language: Английский

A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies DOI Creative Commons
Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi

et al.

Future Internet, Journal Year: 2025, Volume and Issue: 17(4), P. 175 - 175

Published: April 16, 2025

Edge computing (EC) is a distributed approach to processing data at the network edge, either by device or local server, instead of centralized centers cloud. EC proximity source can provide faster insights, response time, and bandwidth utilization. However, architecture makes it vulnerable security breaches diverse attack vectors. The edge paradigm has limited availability resources like memory battery power. Also, heterogeneous nature hardware, communication protocols, difficulty in timely updating patches exist. A significant number researchers have presented countermeasures for detection mitigation threats an paradigm. that differs from traditional privacy-preserving mechanisms already used cloud required. Artificial Intelligence (AI) greatly improves through advanced threat detection, automated responses, optimized resource management. When combined with Physical Unclonable Functions (PUFs), AI further strengthens leveraging PUFs’ unique unclonable attributes alongside AI’s adaptive efficient management features. This paper investigates various strategies cutting-edge solutions. It presents comparison between existing strategies, highlighting their benefits limitations. Additionally, offers detailed discussion threats, including characteristics classification different types. also provides overview privacy needs EC, detailing technological methods employed address threats. Its goal assist future pinpointing potential research opportunities.

Language: Английский

Citations

0