Security in Critical Communication for Mobile Edge Computing Based IoE Applications
The new era of the Internet of Everything (IoE) applications demands low latency along with
security into the networks. The cloud-based architecture alone cannot provide low response
time to the users or mobile devices (like phone, laptop, sensors device, etc.). Therefore
between mobile devices and cloud, edge devices (known as Fog device) are introduced as
middleware device. From the edge devices, users can get information from local devices
without interacting with the cloud via the Internet or radio. In such complicated networks …
security into the networks. The cloud-based architecture alone cannot provide low response
time to the users or mobile devices (like phone, laptop, sensors device, etc.). Therefore
between mobile devices and cloud, edge devices (known as Fog device) are introduced as
middleware device. From the edge devices, users can get information from local devices
without interacting with the cloud via the Internet or radio. In such complicated networks …
Abstract
The new era of the Internet of Everything (IoE) applications demands low latency along with security into the networks. The cloud-based architecture alone cannot provide low response time to the users or mobile devices (like phone, laptop, sensors device, etc.). Therefore between mobile devices and cloud, edge devices (known as Fog device) are introduced as middleware device. From the edge devices, users can get information from local devices without interacting with the cloud via the Internet or radio. In such complicated networks, security preservation in communications becomes a challenging task. The security protocols for critical communication in such applications (e-medical, e-banking) are based on the architecture of the networks which can be centralized or distributed or hybrid (a mixture of centralized and distributed). This book chapter discusses the different security protocols in communications for the aforementioned architectures which can be designed for Mobile Edge Computing (MEC) based IoE applications. Moreover, this chapter covers (a) architectures and their security threats, (b) necessity of security model in such applications, (c) different secure communication protocols for those applications, (d) challenges to design security protocols to reduce response time, and latency (e) the future direction of this research domain which can be explored more.
Springer
Showing the best result for this search. See all results