Review on Security Defense Technology Research in Edge Computing Environment

Ke Shang,Weizhen He,Shuai Zhang,Zhi-hua Zhou
DOI: https://doi.org/10.23919/cje.2022.00.170
IF: 1.019
2024-01-01
Chinese Journal of Electronics
Abstract:Edge computing, which achieves quick data processing by sinking data computing and storage to the network edge, has grown rapidly along with the Internet of things. The new network architecture of edge computing brings new security challenges. Based on this, this paper investigates the edge computing security literature published in recent years and summarizes and analyzes research work on edge computing security from different attack surfaces. We start with the definition and architecture of edge computing. From the attack surface between device and edge server, as well as on edge servers, the research describes the security threats and defense methods of edge computing. In addition, the cause of the attack and the pros and cons of defense methods is introduced. The challenges and future research directions of edge computing are given.
engineering, electrical & electronic
What problem does this paper attempt to address?