Research Article

Edge Computing Security with an IoT device

Volume: 1 Number: 1 June 30, 2021
  • Beyda Nur Kars
EN TR

Edge Computing Security with an IoT device

Abstract

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

Keywords

References

  1. Satyanarayanan, M. (2017). Edge Computing. IEEE Computer, 50(10), 36-38.
  2. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
  3. Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016, August). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 157-163). IEEE.
  4. Meng, W., Li, W., Su, C., Zhou, J., & Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Ieee Access, 6, 7234-7243.
  5. Wang, T., Zhang, G., Liu, A., Bhuiyan, M. Z. A., & Jin, Q. (2018). A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 6(3), 4831-4843.
  6. Akkuş, S. (2016). Gömülü sistem tabanlı, kriptolu TCP/IP veri haberleşmesi uygulaması.
  7. Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  8. Kösemen, C., Dalkılıç, G., & Aydın, Ö. (2018). Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish Journal of Electrical Engineering & Computer Sciences, 26(5), 2500-2511.

Details

Primary Language

English

Subjects

Computer Software

Journal Section

Research Article

Authors

Beyda Nur Kars This is me
Türkiye

Publication Date

June 30, 2021

Submission Date

November 25, 2020

Acceptance Date

February 15, 2021

Published in Issue

Year 2021 Volume: 1 Number: 1

APA
Kars, B. N. (2021). Edge Computing Security with an IoT device. Journal of Emerging Computer Technologies, 1(1), 14-17. https://izlik.org/JA59CY49AS
Journal of Emerging Computer Technologies
is indexed and abstracted by
Harvard Hollis, Scilit, ROAD, Google Scholar, OpenAIRE

Publisher
Izmir Academy Association

88x31.png