Abstract
Edge computing has been introduced to support the real-time applications that require quick responses in the Internet of Things (IoT) network. The traditional cloud-based network management cannot serve the real-time applications due to the increased latency. In edge computing, several edge nodes will be deployed at the edge of the network. Thus, the applications will be able to get the resource support from the nearest location. Based on the execution strategy, the edge-based computation can be categorized into fog computing, mobile edge computing, and mobile cloud computing. Edge computing can be integrated to the wide range of IoT-enabled environments, which include smart city, health care, vehicular network, industrial environments, etc. Most of the applications in these smart environments handle sensitive data. The deployment of lightweight IoT devices and the edge nodes increased the security threats in the network. Since each IoT-enabled environment has been established for accomplishing different needs, the security-related challenges will vary in each environment. Application specific intelligent security algorithms need to be integrated within the IoT network for removing security threats. The resource-limited IoT devices cannot execute such complex algorithms. Thus, all such mechanisms will be integrated to the nodes deployed in the edge layer. This chapter discusses the security threats associated with different applications in edge-based IoT networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.