Next Article in Journal
An Application of IoT in a Drone Inspection Service for Environmental Control
Previous Article in Journal
Expert Demand for Consumer Sleep Technology Features and Wearable Devices: A Case Study
 
 
Review

A Survey of Security Architectures for Edge Computing-Based IoT

Mobile Technology Lab (MOTEL), Department of Technology, Kristiania University College, Kirkegata 24-26, 0153 Oslo, Norway
*
Author to whom correspondence should be addressed.
Academic Editor: Javier Berrocal
IoT 2022, 3(3), 332-365; https://doi.org/10.3390/iot3030019
Received: 16 February 2022 / Revised: 17 June 2022 / Accepted: 21 June 2022 / Published: 30 June 2022
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios. View Full-Text
Keywords: edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture edge computing (EC); EC-based IoT; Internet of Things (IoT); security; privacy; architecture
Show Figures

Figure 1

MDPI and ACS Style

Fazeldehkordi, E.; Grønli, T.-M. A Survey of Security Architectures for Edge Computing-Based IoT. IoT 2022, 3, 332-365. https://doi.org/10.3390/iot3030019

AMA Style

Fazeldehkordi E, Grønli T-M. A Survey of Security Architectures for Edge Computing-Based IoT. IoT. 2022; 3(3):332-365. https://doi.org/10.3390/iot3030019

Chicago/Turabian Style

Fazeldehkordi, Elahe, and Tor-Morten Grønli. 2022. "A Survey of Security Architectures for Edge Computing-Based IoT" IoT 3, no. 3: 332-365. https://doi.org/10.3390/iot3030019

Find Other Styles

Article Access Map by Country/Region

1
Back to TopTop