Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments

Mahadevappa, Poornima and Al-amri, Redhwan and Alkawsi, Gamal and Alkahtani, Ammar and Alghenaim, Mohammed and Alsamman, Mohammed (2024) Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments. IoT, 5 (1). pp. 123-154. ISSN 2624-831X

Full text not available from this repository.
Official URL: https://www.mdpi.com/2624-831X/5/1/7

Abstract

Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can impact the data being processed. Thus, safeguarding sensitive data from being exposed to illegitimate users is crucial to avoiding uncertainties and maintaining the overall quality of the service offered. Most existing edge security models have considered attacks during data analysis as an afterthought. In this paper, an overview of edge data analytics in healthcare, traffic management, and smart city use cases is provided, including the possible attacks and their impacts on edge data analytics. Further, existing models are investigated to understand how these attacks are handled and research gaps are identified. Finally, research directions to enhance data analytics at the edge are presented.

Item Type: Article
Additional Information: ** Article version: VoR ** From Crossref journal articles via Jisc Publications Router ** History: epub 05-03-2024; issued 05-03-2024. ** Licence for VoR version of this article starting on 05-03-2024: https://creativecommons.org/licenses/by/4.0/
Uncontrolled Keywords: Electrical and Electronic Engineering, Engineering (miscellaneous), Computer Science (miscellaneous)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Institutes and Academies > Wales Institute for Science & Art (WISA) > Academic Discipline: Applied Computing
SWORD Depositor: JISC Publications Router
Depositing User: JISC Publications Router
Date Deposited: 20 Mar 2024 16:02
Last Modified: 20 Mar 2024 16:02
URI: https://repository.uwtsd.ac.uk/id/eprint/2888

Administrator Actions (login required)

Edit Item - Repository Staff Only Edit Item - Repository Staff Only