Abstract

With the continuous development of IoT applications, a large number of mobile terminal devices started participating in service computing. The traditional cloud computing model can no longer meet the speed of data generated by network edge devices, thus, edge computing model emerges and has become a research hotspot in recent years. This paper introduces the concept of edge computing and the edge computing reference model in Internet of Things, analyses the vulnerable attacks of edge devices, summarizes the main research results of cryptographic security technology in edge computing, and points out that symmetric cryptography is not applicable to edge devices. Identity-based cryptography is more suitable for edge device to edge device communication. Also, pairing-based cryptography is more suitable for edge devices to base station communication. Finally, the application of two kinds of post-quantum cryptography in edge devices is discussed, and several suggestions for the research on security technology in edge computing are put forward.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call