The Review of IoT Security Framework Based on Mobile Edge Computing

Fan Yongkai,Zhao Guanqun,Sun Xiaofeng,Lin Xiaodong
DOI: https://doi.org/10.15344/2456-4451/2019/148
2019-01-01
Abstract:At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.
What problem does this paper attempt to address?