Research on Security Protection Technologies for Edge Computing

Research on Security Protection Technologies for Edge Computing

Authors

  • Bai Fan School of Intelligence Science and Engineering, Qinghai Minzu University, Xining 810007, China
  • Ye Tao School of Intelligence Science and Engineering, Qinghai Minzu University, Xining 810007, China

DOI:

https://doi.org/10.53469/ijomsr.2026.09(02).10

Keywords:

Edge Computing, Identity Authentication, Access Control, Intrusion Detection, Privacy Protection

Abstract

Edge computing deploys computing resources at the network edge to provide users with services featuring low latency and low energy consumption. Nevertheless, security threats including node deception, data breaches and cyber-attacks make it impossible to achieve secure computation offloading. This paper expounds the relevant theories and technologies of edge computing, investigates the security threats during computation offloading, summarizes the existing protection techniques, and explores the challenges and potential research trends.

References

Lopez, P. G., Montresor, A., Epema, D., et al. (2015). Edge-centric computing: vision and challenges. Computer Communication Review, 45(5), 37-42. https://doi.org/10.1145/2831347.2831354

Liu, H. (2021). Research on multi-workflow scheduling algorithm based on deep reinforcement learning under edge computing. Chongqing University. https://doi.org/10.27670/d.cnki.gcqdu.2021.001797

Xu, J., Chen, L., Liu, K., et al. (2016). Designing security-aware incentives for computation offloading via device-to-device communication. https://doi.org/10.48550/arXiv.1611.03841

Roman, R., Lopez, J., & Mambo, M. (2016). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(PT.2), 680-698. https://doi.org/10.1016/j.future.2016.11.009

Yi, S., Qin, Z., & Li, Q. (2015). Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685–695). Springer International Publishing. https://doi.org/10.1007/978-3-319-21837-3_67

Tadi, S., Kova, M., & Cokorilo, O. (2021). The application of drones in city logistics concepts. Promet-Traffic & Transportation, 33(3), 451-462. https://doi.org/10.7307/ptt.v33i3.3721

Persiani, C. A. F., Sallazar, F. M., Inoue, R. S., et al. (2025). Drone-based fault recognition in power systems: A systematic review of intelligent methods. Discover Applied Sciences, 7(5), 1-19. https://doi.org/10.1007/s42452-025-06774-z

Semal, B., Markantonakis, K., & Akram, R. N. (2018). A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. IEEE, 1-8. https://doi.org/10.1109/DASC.2018.8569730

Lei, Y., Zeng, L., Li, Y. X., et al. (2021). A lightweight authentication protocol for UAV networks based on security and computational resource optimization. IEEE Access, 9, 53769-53785. https://doi.org/10.1109/ACCESS.2021.3070683

Aafaf, O., Anas, et al. (2017). FairAccess: A new blockchain-based access control framework for the Internet of Things. Security and Communication Networks, 9(18). https://doi.org/10.1002/sec.1748

Jiang, B., Li, J., Wang, H., et al. (2023). Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression. IEEE Transactions on Industrial Informatics, 19(2), 1136-1144. https://doi.org/10.1109/TII.2021.3131175

Liao, J., Wang, H., & Wu, J. (2023). A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system. Concurrency & Computation: Practice & Experience, 35(4). https://doi.org/10.1002/cpe.7539

Chen, Y., Wen, H., Wu, J., et al. (2019). Clustering based physical-layer authentication in edge computing systems with asymmetric resources. Sensors, 19(8), 1926. https://doi.org/10.3390/s19081926

Alsubhi, K. (2024). A secured intrusion detection system for mobile edge computing. Applied Sciences, 14(4), 2076-3417.

Wang, D., Yi, Y., Yan, S., et al. (2023). A node trust evaluation method of vehicle-road-cloud collaborative system based on federated learning. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2022.103013

Liu, X. H., Yang, C. Y., Xu, R. Z., & Nian, J. C. (2023). Location privacy protection for multi-access edge computing in smart grid based on reinforcement learning. Electric Power Information and Communication Technology, 21(1), 47-53.

Liu, Z., Wang, J., Gao, Z., et al. (2023). Privacy-preserving edge computing offloading scheme based on whale optimization algorithm. Journal of Supercomputing. https://doi.org/10.1007/s11227-022-04756-1

Yu, H., Liu, J., Hu, C., et al. (2023). Privacy-preserving task offloading strategies in MEC. Sensors, 23(1), 95. https://doi.org/10.3390/s23010095

Wu, G., Chen, X., & Shen, Y. S. (2024). Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL. Journal of Parallel and Distributed Computing, 183(Jan.), 104775. https://doi.org/10.1016/j.jpdc.2023.104775

Sun, Y., Li, N., & Tao, X. (2021). Privacy preserved secure offloading in the multi-access edge computing network. In 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) (pp. 1-6). https://doi.org/10.1109/WCNCW49093.2021.9419987

Downloads

Published

2026-02-28

Issue

Section

Articles

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.

Loading...