Abstract

Edge computing (EC), is a technological game changer that has the ability to connect millions of sensors and provide services at the device end. The broad vision of EC integrates storage, processing, monitoring, and control of operations in the Edge of the network. Though EC provides end-to-end connectivity, speeds up operation, and reduces latency of data transfer, security is a major concern. The tremendous growth in the number of Edge Devices and the amount of sensitive information generated at the device and the cloud creates a broad surface of attack and therefore, the need to secure the static and mobile data is imperative. This article is a comprehensive survey that describes the security and privacy issues in various layers of the EC architecture that result from the networking of heterogeneous devices. Second, it discusses the wide range of machine learning and deep learning algorithms that are applied in EC use cases. Following this, this article broadly details the different types of attacks that the Edge network confronts, and the intrusion detection systems and the corresponding machine learning algorithms that overcome these security and privacy concerns. The details of machine learning and deep learning techniques for EC security are tabulated. Finally, the open issues in securing Edge networks and future research directions are provided.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.