Abstract

AbstractIntegration of apps through emerging Internet of Things (IoT) technology with edge computing opens up increased possibilities for building a smart network environment. The deployment of Industrial Internet of Things (IoTs/IIoT) sensors and devices for various purposes in smart cities is gaining momentum. Owing to edge computing, the central network and cloud technology end users are getting close enough. Increased deployment of these sensors and devices coupled with massive data processing gives attackers the right incentives. Most network assaults attempt to exploit potential IoT device inconsistencies and misconfigurations. Attackers are trying to spread the dynamism of malicious activities and to cripple the entire network environment. Edge computing threats and bugs are spread in a manner that they emanate from endpoints, IoT sensors, networking fabrics, and edge computing tools. It should take into account the scale emanating from the rapid proliferation of devices and the increasing potential for attacks. This paper provides a comprehensive end-to-end security solution framework with the detective model to identify anomalies in the networks by providing cross-layer security solutions.KeywordsIoTIIoTSmart cityEdge computingCross-layerEnd-to-end security

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call