Edge Security: Challenges and Issues
- URL: http://arxiv.org/abs/2206.07164v1
- Date: Tue, 14 Jun 2022 20:49:48 GMT
- Title: Edge Security: Challenges and Issues
- Authors: Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Ashish Kundu,
Ramana Kompella
- Abstract summary: Edge computing shifts data processing services to the network edge, where data are generated.
This paper discusses the security threats and vulnerabilities emerging from the edge network architecture spanning from the hardware layer to the system layer.
- Score: 7.315147165274525
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Edge computing is a paradigm that shifts data processing services to the
network edge, where data are generated. While such an architecture provides
faster processing and response, among other benefits, it also raises critical
security issues and challenges that must be addressed. This paper discusses the
security threats and vulnerabilities emerging from the edge network
architecture spanning from the hardware layer to the system layer. We further
discuss privacy and regulatory compliance challenges in such networks. Finally,
we argue the need for a holistic approach to analyze edge network security
posture, which must consider knowledge from each layer.
Related papers
- Security Evaluation in Software-Defined Networks [1.9713190626298576]
Cloud computing has led to a significant increase in Data Centre (DC) network requirements.
Traditional DCs are struggling to meet the flexible, centrally managed requirements of cloud computing applications.
This article presents a framework for evaluating security of Software-Defined Networks (SDN)
arXiv Detail & Related papers (2024-08-21T09:56:14Z) - Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure [0.04096453902709291]
This analysis explores the impact of quantum computing on critical infrastructure and cloud services.
We advocate for proactive security strategies and collaboration between sectors to develop and implement quantum-resistant cryptography.
This blueprint strengthens each area's defenses against potential quantum-induced cyber threats.
arXiv Detail & Related papers (2024-04-16T15:36:23Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Full mesh networking technology with peer to peer grid topology based on variable parameter full dimensional space [2.6832339683065056]
The security of VPN is based on the division of geographical boundaries.
The granularity is relatively coarse, which is difficult to cope with the dynamic changes of the security situation.
This paper proposes a full mesh networking mechanism with variable parameter full-dimensional spatial peer-to-peer grid topology.
arXiv Detail & Related papers (2023-09-21T09:14:31Z) - A Comprehensive Survey on the Cyber-Security of Smart Grids:
Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions [0.5735035463793008]
We provide a classification of attacks based on the Open System Interconnection (OSI) model.
We discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication.
arXiv Detail & Related papers (2022-06-22T14:55:06Z) - Towards Energy-Efficient and Secure Edge AI: A Cross-Layer Framework [13.573645522781712]
Deep neural networks (DNNs) and spiking neural networks (SNNs) offer state-of-the-art results on resource-constrained edge devices.
These systems are required to maintain correct functionality under diverse security and reliability threats.
This paper first discusses existing approaches to address energy efficiency, reliability, and security issues at different system layers.
arXiv Detail & Related papers (2021-09-20T20:22:56Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Towards Self-learning Edge Intelligence in 6G [143.1821636135413]
Edge intelligence, also called edge-native artificial intelligence (AI), is an emerging technological framework focusing on seamless integration of AI, communication networks, and mobile edge computing.
In this article, we identify the key requirements and challenges of edge-native AI in 6G.
arXiv Detail & Related papers (2020-10-01T02:16:40Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.