A survey of edge computing-based designs for IoT security

Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security des...

Full description

Bibliographic Details
Main Authors: Kewei Sha, T. Andrew Yang, Wei Wei, Sadegh Davari
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2020-05-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864818303018