Delving into Security Horizons: A Study of EC-IoT Landscape
Main Article Content
Abstract
The past several eons witnessed a leviathan proliferation in the sheer volume of data obtained from actuators, various Internet of Things (IoT) devices, and sensors. Contemporarily, cloud-based computing resources situated in remote data centers are cardinally used to manage IoT data. Network capacity and communication delay therefore turn into decisive constraints. Ergo, edge computing (EC) is emerging as a technologically advance approach that establishes storage and processing of data in close proximity to the end users, engendering the concept of EC-assisted IoT. Nevertheless, because of the prudent nature of the gathered data and the ingrained debility of edge nodes, there are still a number of security issues with EC-IoT. A thorough analysis of the security and privacy concerns that still exist in the EC-IoT ecosystem is conducted in this research. Precisely, the article begins with a concise overview of EC and IoT technologies and their respective use cases. The paper further offers an overview of the forces propelling EC-IoT and describes an edge-centric design that assists in surmounting the shortcomings of conventional IoT systems. Subsequently, the paper addresses beaucoup privacy and security issues that still exist in the redesigned architecture and offers a few defense mechanism against those risks. Lastly, suggestions for unsolved research issues and untapped research opportunities have been posited.