Telecommunications Science ›› 2018, Vol. 34 ›› Issue (7): 135-147.doi: 10.11959/j.issn.1000-0801.2018181

Special Issue: 边缘计算

• Enterprises: • Previous Articles     Next Articles

Security of intelligent edge computing:a survey

Xingshuo AN1,Guixing CAO2,Li MIAO1,Shubo REN2,Fuhong LIN1   

  1. 1 University of Science and Technology Beijing,Beijing 100083,China
    2 China Institute of Space Technology,Beijing 100094,China
  • Online:2018-07-20 Published:2018-07-28
  • Supported by:
    The National Key R&D Program of China;Foundation of Science and Technology on Information Assurance Laboratory;The National Natural Science Foundation of China

Abstract:

With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out.

Key words: edge computing, security technology, system framework

CLC Number: 

No Suggested Reading articles found!