A survey on various security protocols of edge computing: A survey on various security protocols

Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and p...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Journal of supercomputing 2025, Vol.81 (1)
Hauptverfasser: Bhattacharya, Tathagata, Peddi, Adithya Vardhan, Ponaganti, Srikanth, Veeramalla, Sai Teja
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and prevention of cyberattacks. This paper gives a comprehensive evaluation of the edge security landscape in peripheral computing, with specialized expertise in identifying and mitigating various types of attacks. We explore the challenges associated with detecting and preventing attacks in edge computing environments, acknowledging the limitations of existing approaches. One of the very interesting novelties that we include in this survey article is, that we designed a Web application that runs on an edge network and simulates SQL injection attacks-a common threat in edge computing. Through this simulation, we examined every one of the cleanup strategies used to discover and prevent such attacks using input sanitization techniques, ensuring that the malicious SQL code turned neutralized. Our studies contribute to deeper know-how of the security landscape in edge computing by providing meaningful insights into the effectiveness of multiple prevention strategies.
ISSN:0920-8542
1573-0484
DOI:10.1007/s11227-024-06678-6