检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Ke SHANG Weizhen HE Shuai ZHANG
机构地区:[1]National Digital Switching System Engineering and Technological R&D Center,Zhengzhou 450001,China
出 处:《Chinese Journal of Electronics》2024年第1期1-18,共18页电子学报(英文版)
基 金:supported by the National Natural Science Foundation of China(Grant No.62072467);the National Key R&D Program of China(Grant Nos.2021YFB1006200 and 2021YFB1006201)。
摘 要:Edge computing,which achieves quick data processing by sinking data computing and storage to the network edge,has grown rapidly along with the Internet of things.The new network architecture of edge computing brings new security challenges.Based on this,this paper investigates the edge computing security literature published in recent years and summarizes and analyzes research work on edge computing security from different attack surfaces.We start with the definition and architecture of edge computing.From the attack surface between device and edge server,as well as on edge servers,the research describes the security threats and defense methods of edge computing.In addition,the cause of the attack and the pros and cons of defense methods is introduced.The challenges and future research directions of edge computing are given.
关 键 词:Edge computing Security THREAT DEFENSE Architecture Attack surface
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249