Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Edge AI Solutions for Real-Time IoT Device Threat Monitoring

View through CrossRef
The rapid proliferation of Internet of Things (IoT) devices across industrial, commercial, and consumer environments has significantly expanded the attack surface of modern networks. These devices often operate with limited computational resources, heterogeneous architectures, and minimal built-in security, making them prime targets for cyber threats such as malware infiltration, denial-of-service attacks, and data exfiltration. Traditional cloud-centric security approaches are hindered by latency, bandwidth constraints, and privacy concerns, limiting their ability to provide timely threat detection and response. Edge Artificial Intelligence (Edge AI) offers a transformative solution by enabling real-time threat monitoring directly on or near IoT devices, leveraging localized processing to analyze data streams, detect anomalies, and trigger rapid mitigation without relying on constant cloud connectivity. This paper presents a comprehensive study of Edge AI solutions for IoT threat monitoring, focusing on lightweight machine learning and deep learning models optimized for edge hardware such as microcontrollers, single-board computers, and dedicated AI accelerators. We explore architectural frameworks integrating Edge AI into IoT ecosystems, including distributed threat intelligence, on-device inference, and hybrid edge–cloud collaboration models. Emphasis is placed on anomaly detection, behavioral profiling, and federated learning techniques that enhance detection accuracy while preserving data privacy. Experimental evaluations on representative IoT security datasets, such as UNSW-IoT and BoT-IoT, demonstrate that Edge AI-based systems can achieve low-latency detection with competitive accuracy compared to cloud-based methods, while significantly reducing network overhead. We further discuss deployment challenges, including model compression, energy efficiency, adversarial resilience, and lifecycle management in dynamic IoT environments. The paper concludes by identifying future research opportunities in explainable Edge AI for security, multi-modal threat data fusion, and standardized evaluation benchmarks for real-time IoT threat monitoring. Our findings highlight that Edge AI, when strategically implemented, can play a pivotal role in securing IoT infrastructures by enabling scalable, low-latency, and privacy-preserving threat detection capabilities at the network edge.
Title: Edge AI Solutions for Real-Time IoT Device Threat Monitoring
Description:
The rapid proliferation of Internet of Things (IoT) devices across industrial, commercial, and consumer environments has significantly expanded the attack surface of modern networks.
These devices often operate with limited computational resources, heterogeneous architectures, and minimal built-in security, making them prime targets for cyber threats such as malware infiltration, denial-of-service attacks, and data exfiltration.
Traditional cloud-centric security approaches are hindered by latency, bandwidth constraints, and privacy concerns, limiting their ability to provide timely threat detection and response.
Edge Artificial Intelligence (Edge AI) offers a transformative solution by enabling real-time threat monitoring directly on or near IoT devices, leveraging localized processing to analyze data streams, detect anomalies, and trigger rapid mitigation without relying on constant cloud connectivity.
This paper presents a comprehensive study of Edge AI solutions for IoT threat monitoring, focusing on lightweight machine learning and deep learning models optimized for edge hardware such as microcontrollers, single-board computers, and dedicated AI accelerators.
We explore architectural frameworks integrating Edge AI into IoT ecosystems, including distributed threat intelligence, on-device inference, and hybrid edge–cloud collaboration models.
Emphasis is placed on anomaly detection, behavioral profiling, and federated learning techniques that enhance detection accuracy while preserving data privacy.
Experimental evaluations on representative IoT security datasets, such as UNSW-IoT and BoT-IoT, demonstrate that Edge AI-based systems can achieve low-latency detection with competitive accuracy compared to cloud-based methods, while significantly reducing network overhead.
We further discuss deployment challenges, including model compression, energy efficiency, adversarial resilience, and lifecycle management in dynamic IoT environments.
The paper concludes by identifying future research opportunities in explainable Edge AI for security, multi-modal threat data fusion, and standardized evaluation benchmarks for real-time IoT threat monitoring.
Our findings highlight that Edge AI, when strategically implemented, can play a pivotal role in securing IoT infrastructures by enabling scalable, low-latency, and privacy-preserving threat detection capabilities at the network edge.

Related Results

Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...
Optimizing edge cloud deployments for video analytics
Optimizing edge cloud deployments for video analytics
(English) As our digital world and physical realities blend together, we, as users, are growing to expect real-time interaction wherever and whenever we want. Newer internet servic...
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
Abstract: This research focuses on technology and integration tools for IoT environments, with an emphasis on three main aspects: the integration of Building Information Modeling (...
AI-driven zero-touch orchestration of edge-cloud services
AI-driven zero-touch orchestration of edge-cloud services
(English) 6G networks demand orchestration systems capable of managing thousands of distributed microservices under sub-millisecond latency constraints. Traditional centralized app...
Current state and prospects of edge computing within the Internet of Things (IoT) ecosystem
Current state and prospects of edge computing within the Internet of Things (IoT) ecosystem
The burgeoning growth of the Internet of Things (IoT) has prompted a paradigm shift in computing architectures, leading to the emergence and rapid evolution of edge computing. This...
The Synergistic Integration of Edge Computing and IoT: Applications, Benefits, and Future Directions
The Synergistic Integration of Edge Computing and IoT: Applications, Benefits, and Future Directions
The convergence of Edge Computing and the Internet of Things (IoT) has revolutionized the landscape of computing systems, offering a synergistic approach that unlocks new opportuni...
Design of Control and Monitoring System for Electrical Power on kWh Meter Based on Internet of Things (IoT)
Design of Control and Monitoring System for Electrical Power on kWh Meter Based on Internet of Things (IoT)
Electricity theft is the illegal use of electrical power without proper authorization and payment. This act causes losses to the electricity provider and the public, poses safety h...

Back to Top