Content area

Abstract

Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and prevention of cyberattacks. This paper gives a comprehensive evaluation of the edge security landscape in peripheral computing, with specialized expertise in identifying and mitigating various types of attacks. We explore the challenges associated with detecting and preventing attacks in edge computing environments, acknowledging the limitations of existing approaches. One of the very interesting novelties that we include in this survey article is, that we designed a Web application that runs on an edge network and simulates SQL injection attacks-a common threat in edge computing. Through this simulation, we examined every one of the cleanup strategies used to discover and prevent such attacks using input sanitization techniques, ensuring that the malicious SQL code turned neutralized. Our studies contribute to deeper know-how of the security landscape in edge computing by providing meaningful insights into the effectiveness of multiple prevention strategies.

Details

Business indexing term
Title
A survey on various security protocols of edge computing
Author
Bhattacharya, Tathagata 1 ; Peddi, Adithya Vardhan 1 ; Ponaganti, Srikanth 1 ; Veeramalla, Sai Teja 1 

 Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) 
Publication title
Volume
81
Issue
1
Pages
310
Publication year
2025
Publication date
Jan 2025
Publisher
Springer Nature B.V.
Place of publication
New York
Country of publication
Netherlands
Publication subject
ISSN
09208542
e-ISSN
15730484
Source type
Scholarly Journal
Language of publication
English
Document type
Journal Article
Publication history
 
 
Online publication date
2024-12-18
Milestone dates
2024-10-31 (Registration); 2024-10-31 (Accepted)
Publication history
 
 
   First posting date
18 Dec 2024
ProQuest document ID
3256609876
Document URL
https://www.proquest.com/scholarly-journals/survey-on-various-security-protocols-edge/docview/3256609876/se-2?accountid=208611
Copyright
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
Last updated
2025-10-03
Database
ProQuest One Academic