论文标题

关于边缘计算辅助互联网的安全性和隐私问题的调查

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things

论文作者

Alwarafy, Abdulmalik, Al-Thelaya, Khaled A., Abdallah, Mohamed, Schneider, Jens, Hamdi, Mounir

论文摘要

物联网(IoT)是一种创新的范式,旨在提供现在是我们日常生活中一部分的大规模应用程序。数以百万计的智能设备被部署在复杂的网络中,以提供充满活力的功能,包括通信,监视和控制关键基础架构。但是,由于带宽和资源稀缺,在网络边缘产生的物联网设备的大量增长以及在网络边缘生成的相应数据流量产生了额外的负担。因此,Edge Computing(EC)正在成为一种创新策略,它将数据处理和存储在最终用户附近,从而导致所谓的EC辅助物联网。尽管此范式提供了独特的功能和增强的服务质量(QOS),但它也引入了数据安全和隐私方面的巨大风险。本文在EC辅助物联网的背景下对安全性和隐私问题进行了全面调查。特别是,我们首先介绍了EC辅助物联网的概述,包括定义,应用程序,体系结构,优势和挑战。其次,我们在EC辅助物联网的背景下定义了安全性和隐私。然后,我们广泛讨论了EC辅助物联网中攻击的主要分类,并提供了可能的解决方案和对策以及相关的研究工作。之后,我们进一步对基于安全服务和安全目标和功能的文献中讨论的一些安全性和隐私问题进行了分类。最后,还提供了一些开放的挑战和未来针对安全的EC辅助物联网范式的研究指示。

Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art centralized cloud computing paradigm due to the bandwidth and resources scarcity. Hence, edge computing (EC) is emerging as an innovative strategy that brings data processing and storage near to the end users, leading to what is called EC-assisted IoT. Although this paradigm provides unique features and enhanced quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源