Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis of Security Issues of Edge Computing Based Internet of Things Applications

View through CrossRef
Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.
Title: Analysis of Security Issues of Edge Computing Based Internet of Things Applications
Description:
Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet.
The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year.
Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application.
Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications.
This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.

Related Results

The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Research on Intelligent Power Automation Technology Based on Edge Computing of Power Internet of Things
Research on Intelligent Power Automation Technology Based on Edge Computing of Power Internet of Things
With the rapid development of modern economy and the rapid promotion of science and technology, electricity is the realistic need for further transformation of various industries i...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
An information security analysis method of Internet of things based on balanced double SVM
An information security analysis method of Internet of things based on balanced double SVM
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems e...
Enhancing Security and Efficiency in IoT through Edge Computing
Enhancing Security and Efficiency in IoT through Edge Computing
The Internet of Things (IoT) has witnessed exponential growth, with billions of connected devices generating vast amounts of data. However, this proliferation of IoT devices has ra...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...

Back to Top