Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey
Open Access
- 14 September 2020
- journal article
- review article
- Published by Hindawi Limited in Security and Communication Networks
- Vol. 2020, 1-13
- https://doi.org/10.1155/2020/8872586
Abstract
With the explosive growth of data generated by the Internet of Things (IoT) devices, the traditional cloud computing model by transferring all data to the cloud for processing has gradually failed to meet the real-time requirement of IoT services due to high network latency. Edge computing (EC) as a new computing paradigm shifts the data processing from the cloud to the edge nodes (ENs), greatly improving the Quality of Service (QoS) for those IoT applications with low-latency requirements. However, compared to other endpoint devices such as smartphones or computers, distributed ENs are more vulnerable to attacks for restricted computing resources and storage. In the context that security and privacy preservation have become urgent issues for EC, great progress in artificial intelligence (AI) opens many possible windows to address the security challenges. The powerful learning ability of AI enables the system to identify malicious attacks more accurately and efficiently. Meanwhile, to a certain extent, transferring model parameters instead of raw data avoids privacy leakage. In this paper, a comprehensive survey of the contribution of AI to the IoT security in EC is presented. First, the research status and some basic definitions are introduced. Next, the IoT service framework with EC is discussed. The survey of privacy preservation and blockchain for edge-enabled IoT services with AI is then presented. In the end, the open issues and challenges on the application of AI in IoT services based on EC are discussed.Funding Information
- Xinjiang Production and Construction Corps (2020DB005)
This publication has 77 references indexed in Scilit:
- A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and ApplicationsIEEE Internet of Things Journal, 2017
- The Emergence of Edge ComputingComputer, 2017
- Edge Computing: Vision and ChallengesIEEE Internet of Things Journal, 2016
- The Promise of Edge ComputingComputer, 2016
- Solving Critical Events through Mobile Edge Computing: An Approach for Smart CitiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- World of Empowered IoT UsersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of ThingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Additive Gaussian Noise Based Data Perturbation in Multi-Level Trust Privacy Preserving Data MiningInternational Journal of Data Mining & Knowledge Management Process, 2014
- The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacksKnowledge and Information Systems, 2010
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002