fbpx

Edge Computing and IoT Security

By Orisys Academy on 24th January 2024

 Problem statement

The rapid proliferation of Internet of Things (IoT) devices and the increasing adoption of edge computing introduce new challenges in terms of security. Edge devices often operate in resource-constrained environments, making traditional security solutions impractical. Developing robust security mechanisms for edge computing and IoT devices is critical to protect sensitive data, ensure the integrity of communications, and prevent unauthorized access.

Abstract

The project aims to address the security vulnerabilities associated with edge computing and IoT devices by exploring innovative solutions tailored to resource-constrained environments. The focus will be on developing secure communication protocols, intrusion detection systems, and lightweight encryption algorithms to fortify the overall security posture of edge computing ecosystems.

Outcome

Secure Communication Protocols

  • Developed lightweight, secure communication protocols for edge devices.
  • Ensure data confidentiality, integrity, and authentication in resource-constrained environments.

Intrusion Detection Systems (IDS)

  • Implemented an IDS tailored for edge devices, capable of real-time detection of anomalies and security threats.
  • Provided early response mechanisms to enhance security incident handling at the edge.

Lightweight Encryption Algorithms

  • Researched and implemented encryption algorithms optimized for IoT devices.
  • Achieved a balance between security and computational efficiency, minimizing resource impact.

Integration with Edge Computing Architectures

  • Seamlessly integrated security mechanisms into popular edge computing frameworks.
  • Ensured compatibility for practical deployment and adoption within the broader edge computing community.

Reference

The Internet of Things (IoT) is one of the most widely used technologies today, the number of IoT connections growing by 18% to 14.4 Billion active endpoints globally. Thus, with such a large scale IoT application, security becomes the focus. The issue of intrusion and interception has been a controversial and much disputed subject within the field of IoT security. The main limitation of IoT security, however, is a single security technology cannot ensure security of the IoT system. The Internet of Things requires diverse technologies applied at different layers to work together to ensure security. Based on these problems, proposed a security solution with integrity is necessary. Edge computing is a great way to solve security problems for resource-constrained devices. This paper proposes a machine learning and cryptography combined IoT security scheme at edge computing, achieves monitoring and detection abnormal behaviors of IoT system and automatically responds at an early stage. Designed a lightweight key management scheme without third-party involvement. The combination of active detection and passive protection for IoT security is achieved. Meanwhile, data for this study were collected using Edge-IIoTset dataset for the prediction of IoT security threats in edge computing networks. In this paper, experiments offers some important insights into the model selection for the prediction of time series data. The models selected include Support Vector Machine(SVM), K-Nearest Neighbor(KNN), and Long Short-Term Memory(LSTM) models. The significance of the comparison of several models is to assess their accuracy in detecting IoT communication data. To compares the performance of models, the following performance evaluation parameters were used: Precision, Recall and F1-Score. This study has identified LSTM has better precision in time series data such as communication data, 10% more precision than the other models used in this paper.

  1. H. Kekul et al., “Estimating Missing Security Vectors in NVD Database Security Reports,” International Journal of Engineering and Manufacturing (IJEM), vol. 12, no. 3, pp. 1-13, 2022.

  2. SonicWall, 2021, [online] Available: https://www.sonicwall.com/resources/white-papers/2022-sonicwall-cyber-threat-report/.

  3. A. E. Omolara et al., “The internet of things security: A survey encompassing unexplored areas and new insights,” Computers & Security, vol. 112, pp. 102494, 2022.

  4. C.-K. Wu, Internet of Things Security, Springer, 2021.
  5. Chopra Ashok, “Paradigm shift and challenges in IoT security,” Journal of Physics: Conference Series, vol. 1432, no. 1, 2020, [online] Available: https://doi.org/10.1088/1742–6596/1432/1/012083.

    https://ieeexplore.ieee.org/document/10135211