An Edge Driven Security Framework For Intelligent Internet Of Things
DOI:
https://doi.org/10.32628/CSEIT21742Keywords:
Internet of things, Security Framework, API, asp.net , webservicesAbstract
The use of IoT technologies has increased from 13 percent in 2014 to about 25 percent today. And around the world number of IoT-connected devices is expected to increase to 43 billion by 2023, a threefold increase from 2018. IoT will continue to grow in device numbers and use cases, but organizations must reckon with the security and interoperability challenges that have plagued the market since the beginning. Building robust IOT applications by incorporating security features has become a necessity. Thus, in this article, an edge-driven security framework architecture is described for intelligent IoT systems. A security framework contains all standard security features required by an application such as authentication, authorization, secure connection etc. We introduce the architecture of edge-driven intelligent IoT, and present typical edge-driven intelligent IoT applications. Second, we point out the security threats in edge-driven intelligent IoT in terms of attack behaviour of adversaries. Third, we develop a case study of edge-driven intelligent IoT from the security perspective. Our focus is to develop a middleware or framework between the Users and IoT Environment to ensure users are connected to IoT environment upon authentication for a contract session and create secure communication via cloud between the users and IoT environment
References
- W. Li et al., “Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach,” IEEE Trans. Network Science and Engineering. DOI: 10.1109/TNSE.2020.3014384.
- D. He, S. Chan, and M. Guizani, “Security in the Internet of Things Supported by Mobile Edge Computing,” IEEE Commun. Mag., vol. 56, no. 8, Aug. 2018, pp. 56–61.
- J. M. Jimenez et al., “MHCP: Multimedia Hybrid Cloud Computing Protocol and Architecture for Mobile Devices,” IEEE Network, vol. 33, no. 1, Jan./Feb. 2019, pp. 106–12.
- W. Li et al., “Abnormal Crowd Traffic Detection with Crowdsourcing-Based RSS Fingerprint Position in Heterogeneous Communications Networks,” IEEE Trans. Network Science and Engineering. DOI: 10.1109/TNSE.2020.3014380.
- D. Puthal et al., “Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing,” IEEE Commun. Mag., vol. 56, no. 5, May 2018, pp. 60–65.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.