A survey of edge computing-based designs for IoT security.
Kewei ShaT. Andrew YangWei WeiSadegh DavariPublished in: Digit. Commun. Networks (2020)
Keyphrases
- security problems
- key management
- security issues
- edge detection
- security requirements
- access control
- information security
- security policies
- neural network
- cloud computing
- intrusion detection
- network security
- edge information
- security threats
- security systems
- computer security
- security mechanisms
- resource constrained
- statistical databases
- management system
- wireless sensor networks