Preprint
Review

This version is not peer-reviewed.

A Survey on Edge Computing (Ec) Security Challenges: Classification, Threats, and Mitigation Strategies

A peer-reviewed article of this preprint also exists.

Submitted:

18 February 2025

Posted:

19 February 2025

You are already at the latest version

Abstract
Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, response time, and bandwidth utilization. However, the distributed architecture of EC, makes them vulnerable to data security breaches and diverse attack vectors. The edge paradigm has limited availability of resources like memory and battery power. Also, the heterogeneous nature of the hardware, diverse communication protocols, and difficulty in timely updating security patches exist. A significant number of researchers have presented countermeasures for the detection and mitigation of data security threats in an EC paradigm. However, an approach that differs from traditional data security and privacy-preserving mechanisms already used in cloud computing is required. Artificial Intelligence (AI) greatly improves EC security through advanced threat detection, automated responses, and optimized resource management. When combined with Physical Unclonable Functions (PUFs), AI further strengthens data security by leveraging PUFs’ unique and unclonable attributes alongside AI’s adaptive and efficient management features. This paper investigates various edge security strategies and cutting-edge solutions. It presents a comparison between existing strategies, highlighting their benefits and limitations. Additionally, the paper offers a detailed discussion of EC security threats, including their characteristics and the classification of different attack types. The paper also provides an overview of the security and privacy needs of the EC, detailing the technological methods employed to address threats. Its goal is to assist future researchers in pinpointing potential research opportunities.
Keywords: 
;  ;  ;  ;  ;  

1. Introduction

The Internet of Things (IoT) is a comprehensive network of interconnected physical devices equipped with sensors, software, and various communication technologies, enabling them to communicate and share data over the Internet. Powered by smart devices, edge computing (EC), and big data analytics, IoT is transforming both business operations and the interactions between service providers and customers [1]. The number of IoT devices is estimated to nearly double, rising from 15.9 billion in 2023 to over 32.1 billion by 2030. IoT devices find applications across various industry sectors and consumer markets, such as healthcare, industrial automation, automotive, smart cities, logistics, and agriculture [2,3]. The adoption of IoT has been further fuelled by the integration of advanced technologies such as 5G, AI, Blockchain, and EC [4,5]. In a typical IoT application architecture shown in Figure 1, sensing nodes generate a huge amount of data requiring further processing to enable intelligence for service providers and end users. Cloud computing technology requires sensed data to be uploaded to centralized servers called data centers for further processing and results get transmitted back to the device layer. Such a centralized processing approach puts enormous pressure on the communication network regarding bandwidth, latency, and the vulnerability of data security [6].
Centrally located servers at data centers offer poor quality of service (QoS) in addition to the burden imposed on the communication networks as,
  • Additional costs are involved due to inefficient utilization of bandwidth and network resources,
  • Large-sized data drastically degrades network performance,
  • Billions of connected devices on IoT network make it difficult to manage data traffic, and
  • Time-sensitive IoT applications are bound to get affected due to network-introduced latency [7,8].
For example, a camera installed on an autonomous vehicle captures a large amount of data from its surroundings, to make decisions in real-time. In a cloud computing environment, the time spent in transmitting sensed data from the vehicle to the cloud and receiving processed data back from the cloud is crucial. Further, a large number of such vehicles may cripple the network bandwidth and its reliability. Hence, processing the raw data closer to its source would reduce response times and reduce the burden on the network [9].
The concept of “Edge Computing (EC)” was introduced to reduce communication latency and bandwidth requirements, offer real-time data analysis, lower operational cost, higher scalability, and improve the quality of services [10,11,12,13]. Earlier, the data had to be transmitted to the cloud over long distances, with the results then being sent back to the user through an extended path. EC, being closer to the data source, reduces transmission delays, packet loss, and high energy consumption [9,14,15]. Additionally, EC offers location-aware services and enhances resource allocation by shifting tasks from IoT devices with limited resources to more powerful edge servers [16]. EC is characterized by its heterogeneous distributed network architecture, large-scale data processing, parallel computing capabilities, and support for mobility services, including location tracking. Whether data is stored at edge nodes or in the cloud, the risk of a security breach or hacking remains present. However, EC heightens vulnerability to cyber-attacks and threats because sensitive data is stored and processed in a distributed environment with limited resources, making it challenging to implement complex security algorithms [7,17]. Figure 2 shows an edge-based IoT attack model outlining various threats and vulnerabilities specific to the edge computing environment in the Internet of Things (IoT) context [18].
Also, the dynamic environment at the edge of the IoT network makes it vulnerable to security attacks and challenging to protect. Most of the attacks on edge computing architecture can be placed into four different classes i.e., distributed denial-of-service (DDoS) attacks, side-channel attacks, malware injection attacks, and authentication and authorization attacks [19].
Current research areas in edge computing security and privacy mainly focus on techniques like data privacy, lightweight security protocols, Artificial Intelligence (AI) integration, trust management, and collaborative security. Differential privacy (DP) adds noise to data to protect individual privacy while allowing aggregate data analysis in five critical areas: data transmission, data processing, data model training, data publishing, and location privacy [20,21,22]. Authors from [23], introduce a hybrid differential privacy model combined with adaptive gradient compression, providing stronger protection against inference attacks while transmitting gradient parameters. Implementing secured lightweight encryption and authentication techniques secures data from side-channel and hardware attacks [24]. Samad et. al., proposed an anonymous authentication protocol that utilizes elliptic curve cryptography (ECC) and signcryption techniques [25]. Several encryption models have been developed over the years, using or combining various techniques, like authenticated encryption (AE) with associated data (AEAD) schemes [26].
AI-driven techniques can improve edge environments’ intrusion detection, data confidentiality, and access control. Researchers have developed various strategies for securing edge computing, including machine learning (ML) algorithms and innovative approaches like hybrid feature analysis. ML is particularly effective for detecting anomalies and potential breaches in real-time, providing strong protection against advanced attacks [27,28]. The shift from cloud computing to edge computing has brought intelligence closer to edge devices such as mobile phones, smart speakers, sensors, wearable devices, and sensor networks, enabling faster data processing tasks like inference, pattern matching, and more [29]. AI chips with computational accelerators like Field Programmable Gate Arrays (FPGAs), Graphics Processing Units (GPUs), Tensor Processing Units (TPUs), and Neural Processing Units (NPUs) are integrated into intelligent mobile devices [30]. Trust management is a critical component of EC, involving the processing and storage of data at the network’s edge. Blockchain and distributed ledger technologies (DLTs) enable decentralized, secure, and transparent trust management. Wang et. al., introduced a Blockchain-based secure data aggregation strategy (BSDA) integrating a security label into the block header, which includes the task’s security level (SL) and completion requirement (CR) [31]. Blockchain-based protocol introduced by [32], supports conditional anonymity and efficient key management, overcoming the limitations of traditional cryptographic protocols. Authors of [33], propose multiple edge blockchains that interact through a cloudlet chain operating independently.
Collaborative edge computing selectively shares data or insights among nodes or with the cloud, reducing the overall exposure of private information. Techniques like federated learning (FL) enable multiple devices to train machine learning models locally on their data, without sharing the actual data with others. This approach helps organizations adhere to data residency and privacy laws by ensuring data remains within specific geographic boundaries. Li et. al. have developed algorithms based on Multi-Armed Bandit (MAB) frameworks by sharing information about server security risks [34] while proposes an SDN-based framework [35]. Data disturbance and adversarial training methods are adopted in [36] for generating adversarial samples using the Firefly Algorithm (FA).
Xiao et. al., provide a classification of security attacks in an edge environment under six categories i.e., DDoS attacks, side-channel attacks, malware injection attacks, authentication & authorization attacks, man-in-the-middle attacks, and bad-data injection attacks [19]. A threat intelligence report from “Netscout” reports an upsurge in DDoS attacks during the second half of 2021. About 9.7 million attacks were identified in 2021, which is 14% higher than in 2019 [37]. The number of malware attacks on IoT devices has grown from 813 million to 2.9 billion from 2018 to 2020 [38]. Field programmable gate arrays (FPGAs) are suitable for implementing customized hardware logic and real-time image processing for high-performance edge computation [39]. They possess characteristics that suit edge computing requirements like (i) processing of data streams at lower latency, (ii) adaptability to any algorithm due to their reconfigurable architecture exploiting both spatial and temporal parallelism at a finer granularity, and (iii) thermal stability reduces cooling cost [40]. FPGA-based edge devices have proven their resilience to physical and side-channel attacks. FPGA’s inherent ability to process tasks in parallel and flexibility in handling diverse workloads can match AI and ML algorithms’ computational and processing needs. FPGAs allow greater flexibility in what the processor does, they are very useful in building AI accelerators [41]. The FPGA-based edge reduces the response time by 1.62x for the object application and 1.14x for the face application as compared to CPU-based edge offloading in general [42]. Zhao et. al., presented a novel approach to secure FPGA-based edge devices, using lightweight hardware-assisted chaos-based stream cipher for protecting FPGA bitstreams [43]. Regarding security, IP protection techniques implemented on FPGA have better flexibility and require no extra resource overhead compared to those implemented on the traditional custom circuit. Ngo et. al., implemented a hierarchical decision-making approach combined with an ANN model as a hardware-accelerated framework on the FPGA for real-time detection of network intrusions [44]. An Oscillator Collapse (OC-PUF) designed to utilize manufacturing variations in FPGAs that generate unique responses to input challenges was tested on Altera DE2-115 FPGA boards, achieving an inter-chip Hamming distance of 46.7% [45]. FPGAs can run several lightweight cryptographic protocols simultaneously in addition to advantages like optimal chip area, speed, and power consumption [46]. Silicon physically unclonable functions (PUFs) implemented on FPGA platforms are flexible, secure, cost-effective, and offer a quick turnaround. FPGA-based PUFs are diverse and effective in IP protection [47], RFIDs [48], secured key generation [49], and remote activation [50].
The remainder of this paper is placed under the following sections. Section II discusses the basic edge IoT architecture and key components of the edge ecosystem across three distinct layers of cloud, edge, and devices. Section III comprehensively discusses security, privacy challenges, associated countermeasures, and defense mechanisms deployed in an edge paradigm. Section IV digs into reasons responsible for authentication and trust challenges, access control, and root causes of edge computing security threats, and also proposes future research directions. Finally, we conclude this paper in Section V.

1.1. Methodology

Systematic Literature Reviews (SLR) [51], as well as Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) [52] guidelines were followed while conducting this review work. PRISMA statements shown in Figure 3 help to improve the reporting of systematic reviews and meta-analyses [52].
SLR is a technique of classifying, picking, and critically evaluating research to propose solutions to a framed question by analyzing, and evaluating available literature. In October 2023, all recently published review papers were chosen from relevant and reliable academic repositories such as Google Scholar, IEEE, ACM, Science Open, Science Direct, Springer, Hindawi, Wiley Online Library, and MDPI.

1.2. Motivation

The primary strength of EC in IoT network security lies in its decentralized architecture. EC reduces the need for data to travel, thus reducing the potential attack surface. Hence, due to its precise control over data processing locations and methods, the EC can uphold data privacy regulations like the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA). Therefore, EC enables the implementation of security protocols and analytics directly at the device level, facilitating real-time threat detection and response. EC is expected to possess flexible, lightweight, secure, and self-adaptive data analytic mechanisms based on user data sensitivity. However, the decentralized architecture of EC poses significant trust management challenges due to the issues related to collecting and managing evidence information from edge devices [53]. ML-enabled EC can make data-driven inferences, predictions, and decisions based on acquired knowledge from past data. Also, ML is a preferred choice for IoT services’ privacy and data security due to its analytical capability. However, ML-based security schemes possess serious limitations due to the need for huge training datasets and privacy issues. So, there is an urgent need to devise an ML-based security scheme with low computation and communication costs [54]. ML-based modeling through anomaly detection techniques offers more generic and robust security solutions against unknown attacks. However, ML-based security solutions may be vulnerable to ever-evolving attacks like adversarial ML [55]. With a large amount of data generated by edge devices, there is a need for ML models that can run on resource-constrained edge devices. Also, techniques should exist for compressing the ML models that can make these models lighter and faster while making them suitable for edge deployment. Traditional security solutions rely on cryptographic methods where a secret key is stored within the device. However, the entire security system can be breached if this key is compromised. In contrast, a Physical Unclonable Function (PUF) uses the hardware itself as the medium to generate a unique secret key. The core principle of PUFs is based on the unique, device-level variations introduced during the manufacturing process. PUFs can be applied in various security protocols, including unique identifiers, secret keys, device authentication, intellectual property protection, and pseudo-random bit generators (PRNGs) [56].

1.3. Comparison with Existing Literature

Table 1 lists recently published research articles that comprehensively survey data security and privacy challenges and their mitigation techniques in the context of EC-based IoT services. Topics covered include comprehensive trust management frameworks, mechanisms orchestration, and standardization, software-defined networking (SDN), blockchain, ML techniques, and diverse versions of cryptosystems. PUFs enable the authentication of integrated circuit (IC) chips by exploiting inherent device variations. These features include random delay characteristics of wires and transistors, due to process variations during semiconductor manufacturing processes [57]. PUF-enabled RFIDs and processors are under development that can generate cryptographic keys and make physical cloning of semiconductors difficult [49]. Majzoobi et. al., published a survey on PUF-enabled security primitives for field programmable gate arrays (FPGA) that can mitigate IP theft and tampering at HDL, synthesis, and bitstream levels [58]. Edge machine learning (ML) implementation models and architectures were surveyed by Merenda et. al [59]. Edge ML effectively reduces data load on the IoT network while improving privacy. Also, various security aspects, effective countermeasures through Edge artificial intelligence (AI), and the potential to improve Edge AI through Blockchain and Deep Reinforcement Learning are highlighted in [60,61].
[83] proposes a blockchain-enabled FL-based architecture, that integrates blockchain technology with FL for decentralized training and secure data exchanges in UAV networks. The authors of [63] carried out cryptanalysis of blockchain-based decentralized security solution for EC i.e., DecChain architecture, using the AVISPA simulation tool. The authentication and transactions between users and service providers are verified through blockchain mechanisms. An overview of the integration between blockchain and EC systems, providing a tamper-proof transaction ledger is discussed in [65,84]. The survey Identifies the critical issues in areas such as scalability, self-organization, security, resource management, and combining blockchain’s consensus algorithms with EC dynamic nature. Zhao et. al. conducted a detailed study on the benefits of integrating EC with cloud computing, and performance issues related to resource management, virtualization, and networking in several sub-aspects [73]. Authors of [75,78] review the integration of Intrusion Detection Systems (IDS) and ML techniques on known signatures for an adaptive and efficient performance. A Hybrid Intrusion Detection Framework (EHIDF) for addressing security threats in Mobile Edge Computing (MEC) is proposed proposed by [77], utilizing modules like Signature Detection Module (SDM), Anomaly Detection Module (ADM), and Hybrid Detection Module (HDM). The framework was evaluated using the UNSW-NB15 dataset, which includes various attack types. The researchers in [79] implemented a double PUF-based model on the Xilinx Virtex5 FPGA for authenticating edge devices and software (IP cores), achieving a 61.96% reduction in resource utilization along with a performance stability rate of 99.54%. In [80], XORArbiter PUFs were used for authenticating Edge Data Centres (EDCs) and edge devices, with Raspberry Pi devices simulating EDCs. In [81], a 10-transistor SRAM cell was utilized to perform both XOR encryption (PUF) and MAC operations within the same cell, allowing the processing and encryption of DNN model weights. A delay-based PUF, producing a 1-bit signature, was synthesized and configured on a 28nm FPGA using on-chip resources such as lookup tables (LUTs) and flip-flops, achieving an average uniqueness of 49.7% [82]. A fast and effective data encryption application, called Selective Encryption and Component-Oriented Deduplication (SEACOD) [85] is discussed in context to the EC security [86]. A Blockchain-based mutual authentication scheme integrated into certificate-less cryptography, elliptic curve cryptography, and pseudonym-based cryptography that authenticates transactions between edge servers and IoT devices is presented in [87]. Also, the key generation negotiation mechanism while considering IoT devices’ mobility is implemented on hyper ledger fabric. A review of the current research status in EC security on access control, key management, privacy protection, attack mitigation, and anomaly detection is carried out by [88]. The authors advocate the need for innovative proposals in EC as already-matured cloud computing does not meet recent challenges and requirements. Access control and key management schemes in Information-centric networking (ICN) and non-ICN infrastructures are based on traditional schemes and there is a need for newer architectures with lighter encryption protocols. A secured searching scheme for desired data within own/ shared data on storage as well as a searching scheme for IoT smart devices at the edge of cloud-assisted IoT is proposed in [89]. The researchers claim that their proposed data-sharing mechanism along with the secret and public key encryption improves data processing time as compared to existing cloud-based systems.
A comprehensive overview of blockchain technology and its application in the network control, storage, and computation at edge nodes offering network security, data integrity, and computation verification are presented in [64,65,90]. Blockchain technology integrated into the communication layer of an edge network can manage the radio spectrum and authentication of edge devices, as well as network access control in the network layer [90]. Liu et. al. proposed blockchain-based data, and energy coins on the distributed consensus principle for the secured data exchange in Electric vehicles cloud and edge (EVCE) computing [62]. Blockchain-based decentralized framework named “DecChain” is proposed to eliminate the need for authentication to access third-party services or resources [63]. Also, hardware-assisted blockchain implementation of a defense-in-depth strategy and proper network segmentation forms the basis for a secured and trusted environment for the unidirectional payment channels is investigated by [66,68]. Infrastructure for cloud access through the adoption of the Secure access service edge (SASE) framework, is used for developing strategies for threat and intrusion detection, network segmentation, and defense in depth (DiD) [69,70].

1.4. Novelty and Contribution

The geographical distribution of edge devices increases the chances of a security risk as well as physical interference or damage. In addition, remote accessibility of edge devices presents opportunities for data theft and sabotages corporate operations. There are numerous research works available in the literature that address the above-discussed issues. Some of the research publications are survey conclusions related to the security aspects of IoT networks without any specific consideration of EC-assisted network deployments. The contributions made in this survey are listed below:
  • We present a summary, as well as detailed scrutiny and analysis of security and privacy-related issues about EC-assisted IoT services. Also, security objectives and functions on EC-based IoT applications are discussed.
  • A classification of data security threats and attacks due to poor design approaches, miss configurations, and implementation flaws is discussed. Also, appropriate mitigation techniques for the detection and prevention of attacks are covered.
  • Detailed taxonomy of PUF classification based on silicon and non-silicon-based fabrication is presented, as well as significant performance and quality matrices are discussed.
  • A comprehensive summary of AI/ ML-based cryptography techniques for the mitigation of data security and privacy threats is presented. Also, the significance of reliable data sets and training data for the development of accurate ML algorithms is presented in this survey.
  • A discussion about future security research goals, privacy-related open challenges, and deeper insights into future research directions in the context of the EC-based IoT ecosystem.

2. Edge Computing

The enormous volume of data generated at IoT sensing nodes can overwhelm any commercial network, bringing all activities on the network to a halt. This leads to increased IT costs, dissatisfied customers causing financial and reputational losses, poor productivity in the industry, and most importantly health and safety concerns [91]. EC is the real-time analysis, processing, and storage of data at a location near the source of data where it gets generated. Therefore, EC utilizes the available technology that moves computation nearer to the network edge. This involves handling downstream data for cloud services and upstream data for IoT services. [92]. EC brings computational services, data storage, and retrieval as well as diverse enterprise applications near to the actual consumers of information. We can summarize the benefits of EC, as it eases the load on the network, cloud, and data center systems while mitigating latency concerns, offers quicker responses, and improves application performance, and customers’ experience. An edge computing platform provides its services by [93]:
  • Processing the sensed data away from the central cloud or data center in real-time.
  • Caching, buffering, and optimization of the data close to edge nodes.
  • Transforms raw data from edge nodes into a format that can be processed for further deeper analysis.
There are numerous applications and services, such as industrial automation, virtual reality, real-time traffic management, data analytics, and home automation, that leverage the capabilities of EC. These capabilities include features like mobility support, situational awareness, minimal latency, and proximity to edge nodes or users. [94]. Edge computing complements cloud computing services through improved user experience in the delay-sensitive application as well as offloading the cloud platform [95]. Although there exist similarities between edge and cloud computing, certain distinct characteristics set them apart from each other. The location of EC and cloud computing layers in an IoT network is distinctive. Cloud is located significantly from the nodes/users’ location and induces high latency compared to EC. Location awareness and mobile support are possible in EC as it’s based on a distributed computing model as compared to a centralized model of cloud computing [96]. An EC is a subset of cloud computing, that comprises hosting diverse services and applications in proximity to sensing nodes and users. As shown in Table 2, there is a significant difference between cloud computing and EC. Also, an edge (location) is different from EC (action). Data collection at the edge (location) and forwarding it to a cloud with limited data processing is not considered to be EC. It is just a case of networking. However, if data collection and processing are carried out at the edge of EC.

2.1. Edge Architecture

Several architectures are proposed for the deployment of the EC layer but lack clear definitions and distinctions among nodes. Recent surveys conducted by researchers on EC architectures comprehend numerous outlooks, such as mobile edge cloud servers and networks, application specificity, and considerations regarding resource type, resource management objectives, resource location, and resource utilization. Also, architectural-related challenges like scalability and heterogeneity are elaborated. Premsankar et.al. classified all such edge architectures under three categories i.e., based on the location of resourceful servers from edge devices, resources from heterogeneous edge nodes, and classes of resources at edge & data centers [14].
Figure 4 illustrates a fundamental three-layer architecture for EC. This structure establishes a connection from devices to an edge server, which in turn links to the entire network, encompassing both the cloud and data centers. Within this type of EC architecture, the edge server is situated in a fixed physical location and boasts significant computational capabilities, albeit less powerful than the conventional data centers employed in cloud computing. Furthermore, there is a discernible demarcation between the device level and the edge level, which includes the presence of edge servers. [97,98]. The lowest layer includes the IoT sensing nodes responsible for the ingestion of data and applications. It includes IoT devices like cameras, sensors, controllers, industrial machines, etc. The middle layer includes the edge computing infrastructure for data processing, routing, and computing operations. Data generated at the device layer undergo aggregation, analysis, and processing at the edge servers before being transmitted to the upper layer or returned to the device. Although edge computing servers have lower computational ability than cloud servers but offer better Quality of Service (QoS) and lower latency than cloud servers. At the topmost layer, there are cloud data centers involving a central data center and interconnected regional data centers. Even in an EC architecture, cloud data centers persist to serve a crucial role as storage places of information. This layer is accountable for tasks such as data analytics, artificial intelligence, machine learning, visualization, and more.

2.2. Edge Computing Challenges

EC is characterized by higher bandwidth, lower latency, and real-time services, but it is still in the development stages and lacks a well-defined standard framework. As illustrated in Figure 5, the number of edge devices is experiencing rapid growth, creating significant challenges for cloud servers in handling real-time data processing. Statista projects that by 2030, there will be approximately 6.5 billion consumer-focused edge devices, with their average processing speeds advancing exponentially. As a distributed computing technology, EC necessitates well-defined deployment strategies for application workloads on edge nodes. Deployment strategies should be able to answer key questions like, where to place a workload, connection policies, and heterogeneity of nodes [99]. EC-driven IoT services create management challenges that organizations should overcome to ensure resilient and reliable operations. Equipment suppliers, service providers, and software vendors are required to work collaboratively to offer cohesive interoperability between various network functions and seamless integration from across edge-to-cloud infrastructure. These factors present challenges in deploying, scaling up, and managing the EC paradigm [100].
Some of the challenges that must be addressed for the widespread adoption of edge computing are discussed below:
  • Heterogeneity Many hardware devices and communication standards of diverse natures are deployed at edge networks [101]. EC exhibits heterogeneity across multiple dimensions, including hardware architecture, operating systems, programming languages, accessibility, and the nature of tasks [102]. First, edge devices are diverse, generating data in various formats. Second, data is transmitted through various network access technologies, including 3G, 4G, 5G, WiFi, WiMAX, and LPWAN technologies like Sigfox [103]. Third, the heterogeneous edge nodes providing services encompass a variety of devices such as end-user devices, access points, routers, and switches [53,96].
  • Coordination between communication and computing The integration of EC into IoT systems adds significant complexity due to the diverse resource constraints and operational requirements of edge servers and IoT devices [101]. Mobile edge computing (MEC) is a computing model that extends cloud computing to the network’s edge [104]. Researchers are exploring the integration of Low Earth Orbit (LEO) satellites with MEC’s for low latency computing offloading services by placing MEC servers on LEO satellites [105] as well as collaborative MEC’s among connected entities [106]. Network slicing divides a single physical network into multiple virtualized, independent, and tailored networks, aligning with the distributed models of EC. It is managed through the combined optimization of computing and communication resources in EC environments [107].
  • Partitioning and Offloading Tasks The computational tasks are divided into smaller sub-tasks and routed these tasks for processing either locally on the edge device or offloaded to more powerful edge servers or the cloud. The overall system performance is enhanced by partitioning and offloading tasks while optimally balancing computing and communication resources [108]. Task offloading is a comprehensive process involving application partitioning, decision-making regarding offloading, and executing tasks scattered across the system [109]. The main challenges in designing partitioning and offloading algorithms involve determining the optimal granularity for partitioning, managing resource limitations, adapting to dynamic environments, and addressing the complexity of offloading within blockchain-enabled communication systems [108]. In an MEC system with multiple edge nodes (EN) serving multiple users, user association is pivotal in shaping the task partitioning strategy, necessitating the joint optimization of task partitioning and user association [110].
  • Security and privacy issues EC is vulnerable to access control, identity authentication, information security, and privacy protection-related threats [111]. EC characteristics like geographic distribution, heterogeneity, lower latency, lack of standardized protocols, and operating software expand its attack surface [53,60,101]. Conventional security mechanisms such as attribute or group-signature-based access control, homomorphic encryption, and public-key-based authentication require higher computational ability and storage [112]. Securing edge environments is significantly different from traditional IT security. Implementing security measures on edge devices can potentially hinder their internal operations, impacting the real-time capabilities of edge computing. As a result, a key challenge in edge computing is finding the right balance between minimizing latency and meeting security requirements [113]. Edge operations are typically time-sensitive, safety-critical, and autonomous. The security models implemented in EC networks must accommodate factors such as longer device lifespans and support for legacy infrastructure. Quick patching may not always be possible, particularly if updates require reboots, which could jeopardize safety [114].
  • Monitoring, Accounting, and Billing It is important to continuously monitor the usage of EC resources, account keeping, and billing-related data for better QoS and charging for EC services. Traditional monitoring and accounting methods typically rely on monitoring interfaces on physical nodes, utilizing hardware probes, and correlating data with control plane and management plane information. However, these approaches often neglect the requirements of the distributed nature intrinsic in an edge environment. A sustainable business model for EC services is needed for monitoring, accounting, and billing purposes. Creating a robust business model proves to be quite challenging due to the mobile nature of users and the limited scope of services. The key focus for EC lies in enhancing resource utilization to its fullest extent and effectively monetizing these resources [115,116].

3. Security and Privacy Challenges

The first level of data processing is at the edge of EC, making them vulnerable to security attacks and data theft associated with end users. Security measures adopted in IoTs include advanced security algorithms like attribute-based access control, authentication based on group signatures, homomorphic encryption, and techniques based on public-key cryptography. Such algorithms demand sizable computational capabilities and memory availability on the devices where they are deployed [112]. The cloud can host almost unlimited resources like memories, computing capabilities, power, etc., but lacks real-time user experience due to its physical distance from IoT end devices. Some research efforts have been made in developing and deploying edge-based security architecture designs like firewalls, Packet filters, intrusion detection systems, side-channel signal analysis, authentication and authorization protocols, privacy-preserving mechanisms, real-time traffic monitoring systems (RTMS), and cryptographic schemes. Adversaries use various hardware and software-based techniques to falsify, change, steal, or remove data within edge networks and infect and manipulate edge nodes, devices, or servers found at the edge [117].
Numerous security threats that can compromise user privacy and data integrity or disrupt critical services exist in the edge device layer, communication layer, and edge computing layer in the EC paradigm of IoT network [7,17,118,119]. The commonly identified edge/ communication network attacks are eavesdropping, replay attacks, denial-of-service, and jamming [10,120]. The vulnerabilities associated with various edge peripherals within the computing layer are mostly DoS and DDoS attacks [121], whereas [19] has placed DDoS attacks, side-channel attacks, malware injection attacks, and authentication and authorization attacks under EC infrastructure layer.
However, the research outcomes for edge-based IoT security remain in the early stages of development. [112,122]. Initially, EC was assumed to be resilient against cyberattacks since user data no longer needed to travel to cloud servers. Nonetheless, the edge network layer’s dynamic nature makes it susceptible to data security threats, as unified security protocols cannot be uniformly applied. [123]. Numerous factors contribute to data security and privacy concerns in EC. The vicinity of end users to edge nodes increases the risk of data interception by adversaries. Additionally, the constrained memory and processing capabilities of edge devices, when compared to cloud computing, impede the application of complex encryption techniques, and thus aggravate security challenges. [124]. It is essential for all stakeholders within an EC ecosystem like service providers, system and application developers, and end users to appreciate data security’s ethical, legal, and financial implications. Another pressing concern is determining the ownership of sensitive data collected at edge nodes. [125]. Mukherjee et. al. proposed a layered security framework shown in Figure 6 implemented on cloud-edge computing architecture. Common security components can exist across multiple layers due to network layer and device requirements, and their purpose and functionality might differ [126]. Robust cryptographic techniques are needed in the cloud edge collaborative architecture, as a huge amount of data flow occurs through unsecured or least secured public channels with a higher probability of privacy leakage and unauthorized data access [127].
Implementing a uniform security strategy across all edge nodes is extremely difficult due to their management by various users. Wei Yu et. al. proposed a problem space of EC-based IoT security defined over three distinct classes i.e., transmission, storage, and computation [6],
  • Transmission: Jamming attacks, sniffing attacks, worm propagation, distributed denial-of-service (DDoS), and similar assaults can disrupt data links by choking the network or observing the data flow.
  • Storage: Innumerable sensors and devices produce a gigantic volume of data, which is then stored across various third-party locations. Such arrangement poses issues like, data integrity being seriously challenged due to the distribution of data into many fractions resulting in data packet losses as well as data corruption. Also, adversaries can modify or abuse stored data at third-party locations, leading to data leakage and other privacy issues.
  • Computation: The relocation of computational tasks from the cloud to edge nodes in EC demands an establishment of trust between edge servers and end devices.

3.1. Classification of Edge Computing Security Threats

According to Statista’s 2017 report, approximately 159,700 cyber-attacks targeted edge networks and were grouped under six distinct groups: side-channel attacks, malware injection attacks, DDoS attacks, man-in-the-middle attacks, authentication and authorization attacks, and corrupt data injection attacks. The percentage share of each class of attacks is shown in Figure 7. User privacy and data security are the most important factors from the service provider’s perspective. Sensing network data can extract a lot of private and vulnerable information. For example, access to the data from the electricity and water meters can provide information about the occupancy of a house. There are still open challenges that need to be answered by the EC service providers to protect user-sensitive data.
Figure 8 shows a classification of security and privacy threats, listing their types and origins across various levels and layers within EC networks. All stakeholders in EC, including service providers, system and application developers, and end users, must realize their responsibility against data security threats. Another essential data privacy and security issue is establishing the ownership of collected data at the network edge. A suggested solution is to collect and store data at the edge while leaving ownership to the user. Capable tools and technologies are needed to ensure data privacy and security while meeting EC requirements. Edge nodes are resource-constrained, making deploying advanced data security measures difficult due to their resource-intensive nature. Furthermore, the dynamic nature of the location at the network edge increases vulnerability to security attacks and illegal access to user data. Table ?? summarizes the security and privacy challenges as well as corresponding mitigation techniques against Jamming attacks, distributed denial of service (DDoS) attacks, eavesdropping or sniffing, routing information attacks, physical attacks, and privacy leakage.
Table 3 lists some possible countermeasures against security attacks on edge networks.

3.2. Mitigation Strategies Against EC Security Challenges

The countermeasures against security and privacy challenges in an EC Driven-IoT network are discussed in numerous works of literature and can be summarized and placed under classes as shown in Table 4.
Table 4. Strategies against EC security threats [101].
Table 4. Strategies against EC security threats [101].
Strategy Network layer Limitations
Cryptographic Schemes Communication Layer Power inefficient, computational ability, storage, etc.
Secured data aggregation, deduplication, analysis Data layer Consume power, render sensitive data to intruders’ network bandwidth
Combined with Blockchain Architecture layer Complex system more computing capability
Intrusion Detection System (IDS) Communication Layer Resource consumption
Table 5. Classification of edge security threats.
Table 5. Classification of edge security threats.
Type of threat Description Mitigation strategies
Hardware or software malware Unauthorized hardware or software are injected into the edge network that attacks edge servers or devices. Such malware/ trojans interrupt network services and attackers gain control over edge devices and their data. Side-channel signal analysis, Trojan activation methods, and circuit modification or replacement are the techniques utilized in hardware security [144].
Physical Tampering & Attacks Attackers may exploit physical access to EC nodes/ devices to extract significant and sensitive cryptographic data, manipulate circuits, and alter or corrupt the software and operating systems. Techniques such as system analysis and self-destruction are employed to inhibit or alleviate the destructive effects of physical altering and attacks.
Routing Information Attacks Data throughput, latency, and data paths over a network get affected due to routing attacks. Examples of routing information attacks include black holes, grey holes, wormholes, hello flood, etc. Monitoring malicious traffic and detecting policy violations can serve as effective countermeasures.
Distributed Denial of Service (DDoS) Attacks The continuous transmission of junk data packets toward the target node can exhaust all resources allocated for handling the malicious data packets. This may result in genuine requests getting dropped due to the overload of the target node’s resources. [60]. Three significant DDoS attacks on edge computing devices are outage attacks, sleep deprivation attacks, and battery-draining attacks. The Detect-and-filter technique is a tool against flooding attacks. Also, behavior control of devices and policy-based mechanisms within the network can mitigate DDoS attacks.
Privacy Leakage Privacy Leakage in EC mainly involves three separate classes of privacy concerns i.e., data privacy, location privacy, and identity privacy. Attackers might exploit the location awareness of EC nodes to detect and track device status or to get access to classified data, posing further risks to privacy. To address privacy concerns in EC, a privacy-preserving algorithm can be implemented between the cloud server and the edge server or between the end nodes and the edge server. [145].
Eavesdropping or Sniffing An intruder listens over communication channels to gain access to private data, like the physical location of specific nodes, access or control information of the EC node like node identification or node configuration, message identities (IDs), timestamps, usernames, and passwords. Data encryption technique at edge nodes with asymmetric AES algorithm before the transmission on vulnerable channels, the realization of the connection between the edge nodes and edge server, and authentication service between the transmitting and receiving points could overcome eavesdropping attacks. [10].
Jamming Attacks The attacker transmits a wide range of signals with a similar frequency, potentially disrupting network security. Also, it triggers unintentional interference in wireless networks due to induced noise and collisions. The significant transmission parameters like the signal strength of data packets at the physical layer and the packet loss ratio at the application layer serve as indicators of potential jamming attacks. [146].
Integrity Attacks Against Machine Learning ML techniques utilized in EC-assisted Internet of Things (IoT) are susceptible to two different categories of data security attacks. Causative attacks involve manipulating and injecting misleading training datasets to compromise the training process of ML models and, Exploratory attacks where adversaries exploit vulnerabilities. Researchers propose the use of virtual machines (VMs) with boundaries for running ML processes, hence accelerating the testing and deployment of ML models, and systematic study of attacks in simulated environments, or sandboxes [147,148].
  • Cryptographic schemes: The edge layer which includes local data centers, as well as sensing devices, is vulnerable to security threats. These edge devices need cybersecurity solutions within limited storage and computation capabilities. A Zero-Trust approach is recommended for securing data in the EC paradigm with an assumption that all devices have been compromised and all access has to be strictly monitored and authenticated. The standard encryption/decryption methods are memory and computing exhaustive [128]. ISO/IEC 29192, Lightweight cryptography is a cryptographic algorithm meant for implementation in constrained environments including RFID tags, sensors, contactless smart cards, healthcare devices, etc., for the protection of communication protocols.
  • Secured data aggregation, deduplication, analysis: Data aggregation is a method of clustering the data from various edge nodes by reducing the number of transfers and hence eliminating redundancy. Secure Data Aggregation (SDA) is a highly secure, privacy-preserving, and efficient data compression technique using homomorphic encryption against security attacks such as eavesdropping and forging. The secure deduplication technique removes matching copies of data while supporting data security. It employs Convergent Encryption (CE) for encrypting or decrypting data at the file level, along with a convergent key. [129]. Load distribution is used in EC for even distribution of computational, network traffic, data storage, and security-related tasks across edge devices, edge servers, and the cloud. Thus, load distribution prevents edge devices or servers from getting overwhelmed by diverse tasks while ensuring key security measures like encryption, intrusion detection, and access control are in place. Neto et. al., estimated an optimal number of edge nodes that can be assigned to a particular edge server using equation 1 and further used it in estimating its security factor [130].
    Δ 2 = i = 1 n ω i × φ = 1 δ ϕ φ K i φ K φ min K φ max K φ min j = 1 n ω j
    ω i ( i = 1 , , n ) represents the number of edge devices associated with a particular edge server. Thus, the percentage of devices assigned to edge server i is found by dividing ω i by the total number of devices j = 1 n ω j . ( φ = 1 , , δ ) is the min-max normalized security Key Performance Indicator (KPI) while φ regulates priority metrics.
  • Combined with Blockchain: The advantage of implementing blockchain with EC is that it can offer secure data transfer and processing without needing a centralized server by deploying distributed ledger technology. Blockchain governs protocols that collaboratively make judgments involving transaction execution, exercising mechanisms such as voting and consensus algorithms. [7]. Blockchain is a distributed and secured ledger technology based on the zero-trust architecture, offering a strong shield against data privacy and security threats [131]. Blockchains are integrated into EC that documents transactions in an increasing chain of blocks [132,133]. As shown in Figure 9, each block is connected to the previous one by referencing its cryptographic hash value, except the first block, the genesis block. Each block contains a significant piece of information like the previous hash, timestamp, counter-like mechanism for every hash estimation called a nonce, Merkle root representing hash of all the transaction hashes, and transactions (Tx) for a specific time [134]. Consensus algorithms enthuse trust in the network through an agreement among the validated nodes while deciding to generate newer blocks into the blockchain [33].
    Medhane et. al. proposed a blockchain-enabled Platform-as-a-Service (PaaS) model that ensures data integrity and security of mobile users in an IoT environment [135]. The behavior detection of blockchain nodes using a technique called T2A2vec is carried out by [136] by extracting node account features, transaction time, transaction type, and transaction amount. T2A2vec technique counters tampering of transaction records and carries out authentication of blockchain nodes. BeCome is a blockchain-enabled computation offloading measure used by [137] to ensure data integrity in EC. Also, a nondominated sorting genetic algorithm III (NSGA-III), additive weighting (SAW), and multicriteria decision-making (MCDM) are proposed for optimal resource allocation and offloading strategy. Jangirala et. al. have adopted Lightweight Blockchain-enabled RFID-based Authentication Protocol for Supply Chains (LBRAPS) offers secured and real-time authentication through the integration of blockchain, RFID techniques, and 5G MEC [138]. A decentralized and tamper-proof system using Vickrey-Clarke-Groves (VCG) auction theory is proposed for inducing trust in a collaborative EC while optimizing resource allocation and load balancing [139]. A blockchain-based secured data aggregation (BSDA) approach is used in mobile data collectors (MDCs) for task management and framing of block generation rules [31]. Cheng et. al. integrated blockchain, certificateless cryptography, elliptic curve cryptography, and pseudonym-based cryptography methods in a mutual authentication scheme between the edge servers and devices citecheng2021blockchain. Electronic Health Record (EHR) security is ensured by integrating blockchains in EC while storing users’ data locally on edge devices [140]. A blockchain user or miner estimates a hash value by solving a compute-intensive proof of work (PoW) linking any two immediate blocks after neighboring miners reach a consensus. However, roadblocks are met in resource-limited nodes of the EC network unable to undertake mining and consensus process [141].
  • Intrusion Detection System (IDS): In EC networks, intrusion detection systems (IDS) can play a critical role in detecting malicious actions or attacks. IDS investigates data traffic and resource utilization, issues alerts when suspicious behavior is detected. IDS can be characterized into two groups based on their intrusion detection strategies: signature-based and anomaly-based. Signature-based IDS cross-checks monitored events with a database of known intrusion techniques to identify potential threats. In contrast, anomaly-based IDS learn the normal activities of the system and report any abnormalities or inconsistent events [142]. Spadaccino et. al. and Gyamfi et. al. discuss supervised and unsupervised ML models for IDS, for the detection of anomalies in IoT networks, and deployment challenges of this ML on constrained edge devices [75,78]. A signature and anomaly-based Secured Edge Computing Intrusion Detection System (SEC-IDS) framework is proposed by [77] for improved intrusion detection. A hybrid LDA-LR (Linear Discriminant Analysis-Logistic Regression) edge computing model is proposed in [143], utilizing machine learning and an IDS.

3.3. AI Role in EC Security

Edge intelligence, or Edge AI, represents blending machine learning (ML) or artificial intelligence (AI) with EC. Edge AI enables both model training and inference directly at the edge through collaboration between edge devices or utilizing local edge servers near the devices [149]. It is significant for adopting self-learning security solutions at the edges, thus fostering the development of adaptive and autonomous security mechanisms capable of addressing emerging threats in real-time [150]. AI algorithms can handle highly unpredictable and complex data while ensuring data security against advanced and evolving threats [151]. Edge intelligence implies a network of interconnected systems and devices conceived for data collection, storage, processing, and analysis near the physical location where the data gets generated. This methodology aims to enhance the quality and speed of data processing while improving data privacy and security by preserving sensitive information nearer to its source [152]. The convergence of AI and EC is seen as a natural progression due to their clear intersection. EC is centered around coordinating numerous collaborative edge devices and servers, while AI aims to infuse devices with intelligent behavior by learning from data, thereby simulating human-like intelligence.
AI is important in ensuring data security through its advanced data processing and pattern recognition capabilities [153]. The taxonomy of AI presents numerous techniques like Machine Learning (ML), Deep Learning (DL), Natural Language Processing (NLP), Computer Vision (CV), and Robotics [154]. A Venn diagram shown in Figure 10, demonstrates the relation between artificial intelligence (AI), machine learning, deep learning (DL), data science, and data mining techniques [155].
Machine learning (ML), a subset of AI, learns from past data, whereas deep learning (DL), a more specific area within ML, processes data using several non-linear transformations. DL, compared to traditional ML methods, has demonstrated a remarkable ability to extract and process data, but it also requires sizable computational resources [156]. Decentralized deep learning (DDL), like federated learning (FL) and swarm learning, are promising tools in securing the data processing at edge devices [157]. ML algorithms for data security can broadly be categorized into transaction algorithms and decision algorithms. Transaction algorithms handle data exploration and preprocessing tasks, while decision algorithms are used to manage business decisions [158]. A major advantage of DL over traditional ML techniques is its ability to automatically extract complex, high-level features from data. DL uses hierarchical neural network models that automatically learn from unstructured data, such as images, sound, text and video [28]. Wang et. al. have discussed numerous techniques which optimize DL models for EC, such as model pruning, quantization, early exit methods, and approaches in DL tasks distribution between cloud and edge nodes [107]. Data science covers various aspects of data processing, including collection, storage, analysis, cleaning, visualization, interpretation, decision-making, value creation, and effectively reporting relevant insights. Data mining aims to uncover newer, hidden patterns and knowledge from data [159].
Integrating AI and EC are mutually beneficial to each other as they enable real-time dynamic adjusting and self-optimizing execution of IoT applications. The right-to-left arrow shown in Figure 11 represents optimization and the development of EC that requires the assistance of AI algorithms (e.g., computation offloading optimization). Alternatively, the left-to-right arrow indicates the need for EC deployment closer to edge devices, hence meeting latency-sensitive requirements of AI applications [160]. Deng et. al. have placed edge intelligence in two groups, the first group named “AI for Edge” or Intelligence enable EC utilizes AI technology in resource allocation whereas the second group “AI on Edge” or AI models at the Edge carries out training of the models and inference at the edge [30]. A hierarchical framework proposed in [161] distributes data fusion and AI processing across three levels i.e., edge nodes, edge servers, and the cloud. Data fusion eliminates data redundancy by combining data from multiple sources thus improving AI’s performance. The authors of [162], had proposed a hybrid learning framework as current AI-based anomaly detection systems often report false detection. The proposed framework utilizes Stackelberg game model combined with expert-guided ML rules for higher detection accuracy and minimal false detections. Mitigation techniques against data security and privacy threats are grouped into software-based and hardware-based approaches. In software-based security mechanisms, authentication keys are stored in the non-volatile memories of devices. However, innovations in hardware designs and computational abilities have facilitated data adversaries to breach the security measures adopted under software approaches. Alternatively, hardware-based techniques utilize dedicated hardware-integrated circuits or processors to accomplish cryptographic functions and stored access keys. One of the principal challenges with hardware-based security techniques is their susceptibility to man-in-the-middle attacks. In such attacks, hackers can clone the device if the hardware security module gets compromised. To address these limitations, Gassend et al. proposed hardware-based physically unclonable functions (PUFs) as a security primitive [163]. PUFs leverage intrinsic manufacturing alterations within devices to craft a unique fingerprint of the hardware, rendering it extremely challenging for hackers to reproduce these intrinsic characteristics. However, data acquired from PUFs are vulnerable to environmental factors and the physical conditions of the devices being tested. Subsequently, numerous versions of PUFs have been proposed in the literature to enable device identification and authentication, compliant with a tolerable margin of error [164].

3.3.1. Machine Learning for Data Security and Privacy

Machine Learning (ML) indicates algorithms and statistical models for carrying out specific tasks without the need for explicit instructions. ML algorithm puts up a mathematical model of user data also known as a "training set" capable of making predictions or decisions. ML can be used to detect suspicious activity by analyzing user behavior to detect patterns that may indicate malicious activity and ensure data security and privacy requirements [165]. Machine learning (ML) techniques have the potential for enhanced detection of data security and privacy threats while dealing with huge amounts of data coming out from IoT end devices. Rigaki et. al., mention that the training dataset utilized in the development of ML models is itself vulnerable to a possible data security threat [166]. Usually, the data owners and end users are against the sharing of their sensitive data which becomes a bottleneck in the development of trusted ML models. To circumvent such issues, classification protocols utilize ML classifiers over encrypted data to protect the privacy of end users and service providers.
The training approach in centralized ML modeling involves collection as well as storage of data in a central location or server. Additionally, in a centralized approach, the intended model is trained using a complete dataset on a central server. This type of approach is practical when the training entity owns the data or has authorization to use it. As shown in Figure 12 (a), each participant computes their part of the ML model, and subsequently, a reduced function finalizes the desired model. However, this technique has disadvantages including privacy issues due to the distribution of sensitive data with a central cluster of servers and the training process becoming bottleneck as the dataset grows. Various researchers have proposed an edge-based security system by combining ML with cryptography techniques which monitor and detect suspicious activities on the network and take appropriate countermeasures. The deployed ML models include Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Long Short-Term Memory (LSTM) [167,168].
A huge amount of data is required for the training of AI models and quite often user sensitive data gets exposed in the process. The integration of AI models with differential privacy ensures the accuracy of models with or without the inclusion of user-sensitive data. The traditional ML models might be robust against data attacks but lack feature extraction from the data and fail to detect attacks that have undergone minor modifications [160]. The study in [169] reviews ML frameworks like TensorFlow Lite, Apache MXNet, and Core ML, along with hardware platforms such as Nvidia Jetson and Google Edge TPU, focuses on their efficiency and accuracy in data processing within edge environments.

3.3.2. Federated Learning

Google proposed a distributed ML scheme called Federated Learning (FL), which required a local ML model at each data site and later trained a complex ML model on an aggregating centralized server [170,171]. FL allows the training of AI models without the need to transmit susceptible data to third-party servers. However, FL networks need a large number of heterogeneous distributed devices which reduces its communication efficiency. To circumvent the problem of channel efficiency, Feng et. al., have proposed a Hierarchical Federated Learning (HFL) framework, with an intermediate model aggregator [172]. In a typical distributed learning environment shown in Figure 12 (b), each participant has access to a local dataset, and the parameter server coordinates the participants. The parameter server in the role of an aggregator has no control or access over the data stored on participants. The aggregator server selects participants and aggregates the updated model parameters from the intended participants. Secured model transmission to the server is achieved using cryptographic techniques like Secure Multi-Party Computation (SMC), Differential Privacy (DP), Homomorphic Encryption (HE), etc. among multiple clients without revealing any classified data to each other. Hence, FL has reduced the communication overhead due to the processing of data locally and can offer data privacy and security. Integration of blockchain technology with the FL takes data security to the next higher levels [173]. Blockchain prevents security and privacy threats with its decentralization, immutability, consensus, and transparency characteristics [174]. Among the challenges that FL faces, resource constraints stand at the forefront due to limited power computing nodes and slower communication links. Hence, the FL process at the edge node may take longer time than expected as well as energy overheads. Each data source frequently communicates with the central server as the FL model needs to get updated repeatedly and continuously and there is a higher probability that some nodes upload wrong or old model parameters [175]. A lightweight protocol using secret sharing and a weight masks-based framework is proposed in [176] which protects gradients during FL against attacks like replay and gradient leakage attacks without compromising the model’s accuracy.

3.3.3. Multi-Access Edge Computing

Cloud computing capabilities are brought to the edge servers or nodes in a Multi-access Edge Computing (MEC) network shown in Figure 13. MEC exists between the central cloud servers and edge nodes primarily for managing and processing huge amounts of raw data generated from IoT edge devices [177]. MEC has the potential to improve the quality of service by reducing the end-to-end latency between the edge nodes and data processors as well as improvement in data security and privacy. MEC also fosters data encryption, authentication, and access control at the edge, thus ensuring authorized access and processing of the data. MEC is deployed either by Mobile Network Operators (MNO) or by private cloud service providers closer to end customers and has less latency and higher availability [178]. Previous research works focused on resource allocation algorithms rather than ensuring the security of MEC servers and end devices. Of late, limitations of mobile devices and support for resource-intensive applications were introduced by Mobile Cloud Computing (MCC). MCC supports extended battery lifetime, unlimited storage on demand, improved processing capability, and self-service provisioning.
Due to the distributed, small-scale MEC infrastructure, there is less concentration of significant data, thus there is less chance of security and privacy-related attacks. Also, there is a possibility that MEC servers are owned privately, which eases the data privacy concerns. For example, the enterprise deployment of MEC skips uploading of users’ classified data to remotely located datacentres, as the enterprise administrator manages the authorization, access control, and classifies different levels of service requests at its discretion without involving external parties [179]. MEC can introduce newer classes of services, but its unique characteristics open new types of security and privacy challenges. A huge amount of heterogeneous data generated at IoT edge nodes aggregated, stored, transmitted, and utilized in MEC networks may suffer data leakage incidents [180].

3.3.4. Data Anonymisation Techniques

Data anonymization is a privacy-preserving technique that masks or removes personally identifiable information (PII) from a dataset to protect the privacy of the users. The user identifiers or PII fall under the direct and indirect identifiers type. The attributes that can directly identify a user, such as names, addresses, photos, etc. are direct identifiers, whereas indirect identifiers relate to the attributes that identify users by establishing a relation with other available datasets like age, salary, occupations, etc. The anonymization techniques have an edge over other privacy-enhancing techniques like encryption as they do not require key management and large computational resources. However, data anonymization techniques are an irreversible process that provides privacy but confidentiality or integrity remains unanswered [181]. In recent times, numerous data anonymization techniques have been proposed, including privacy-preserving mechanisms implemented through data masking, pseudonymization, generalization, perturbation, synthetic, etc.
  • Data masking: Data masking is a technique of concealing data by creating faux versions of sensitive user data by modifying private information. The process involves modification techniques like shuffling, modest word or character substitution, encryption, or masking data. Common types of data masking are static, dynamic, and on-the-fly data masking.
  • Pseudonymization: Pseudonymization removes user identifiers from the data set and replaces them with pseudonyms which hides the data source identity. Pseudonymization is defined in the EU-General Data Protection Regulation (GDPR) as “the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information. Such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.” [182].
  • Generalization: It’s a technique of eliminating identifiable aspects of data to fully remove or reduce its identifiability. Generalization picks up a distinguishable identifier and abstracts it into a more general, lesser distinguishable value. Multiple levels of generalization do exist based on the type of data. An example of a generalization technique is bucketing that group records into smaller buckets and minimizes the risk of data security challenges[183].
  • Perturbation Methods: It involves mathematical techniques for the protection of user data privacy. A controlled noise or randomness is added to the data while still able to perform data analysis. These data privacy technique is used in various application domains, including ML, statistics, and cryptography. Another method called the differential privacy technique adds a random noise scaled by a privacy parameter to the original data values.
There are certain limitations and disadvantages of data anonymization techniques, as they reduce the granularity and the accuracy of the data. It may damage the relationships between the data points which is critical for artificial intelligence algorithms or any other data science process. Also, data anonymization techniques can be reverse-engineered by gaining access to external or pseudonym databases.

3.3.5. Intrusion Detection System

An Intrusion Detection System (IDS) is a software or hardware-based system, able to detect malicious activity in an IoT network [184]. Also, IDS can track down any violations in the established network protocols or anomalies. Upon threat detection, IDS has two possible responses [185],
  • Issue alerts: This class of responses comes from passive IDS systems that issue security alerts via email or text messages. Also, a notification is issued to the security information and event management (SIEM) system, which helps security teams detect user behavior anomalies and apply AI for threat detection and incident response.
  • Countermeasure: In this class, Active IDS not only sends alerts, but takes countermeasures like change in access control lists on firewalls to block the suspicious traffic, kill communication-related processes, and redirect traffic to a legitimate part of the network while assessing the threat.
IDS’s normally use one or both of two primary threat detection methods: signature-based or anomaly-based detection, [186],
  • Signature Based: In this method, network packets are analyzed for attack signatures i.e., unique characteristics or behaviors linked to specific threats. The network traffic patterns are compared with attack signatures identified in the past and saved in an internal database. If a packet matches one of the stored signatures, the IDS alerts it. However, signature databases must be updated from time to time with new threat patterns to be effective against ever-evolving cyber threats.
  • Anomaly Based: In this method, the ML approach creates and regularly updates a baseline model of normal network activity. Further, the network activity is compared with the baseline model. It raises alerts if the process uses more bandwidth than usual, or if a device opens a port that is usually closed or has unusual conditions.
  • Specification Based: It’s a combination of the previous two methods which consumes more energy and resources to identify new attacks.
Physical Unclonable Function (PUF) is an alternative authentication scheme without any cryptographic assets burdening the resource-scarce IoT devices.

4. Hardware Security

Edge devices are highly distributed and exposed to numerous threats, including physical tampering, data breaches, and remote cyberattacks. These devices lack standard security practices, deploy heterogeneous communication technologies, and have scalability issues [187]. Thus, strong security measures are required at the hardware level to secure sensitive data and to restrict unauthorized access [188]. Hardware security threats can infiltrate edge devices at any stage of the semiconductor lifecycle, from specification and fabrication to recycling. These threats may arise from unintended design flaws, system side effects, or deliberate malicious modifications during the design process [189]. Both hardware and software-based mitigation techniques are used to reduce or randomize the vulnerable signal footprints [190]. A widely used authentication technique for edge devices is challenge-response protocols, mostly based on cryptographic primitives and secret keys. However, implementing these protocols on resource-constrained IoT devices remains a challenge, and the probability of physical threats like direct probing and side-channel attacks is high. Subsequently, a new security primitive, known as PUFs, arrived that offers secured key storage and lightweight authentication [191].
Hardware attacks can be placed into two distinct categories: non-invasive and invasive attacks, based on the level of physical impact on the device [192]. Common hardware security protocols utilize encryption techniques like the Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) that can be placed under private-key encryption, and public-key encryption. A Hardware Trojan (HT) is a malicious alteration during the chip fabrication stage, that might compromise its functionality or spy on encryption keys and forward sensitive chip data to unauthorized devices. HT detection techniques are placed under destructive or non-destructive approaches. Destructive detection includes reverse engineering techniques, such as dismantling IC architecture with Chemical Mechanical Polishing (CMP) and Scanning Electron Microscopy (SEM). However, non-destructive methods analyze IC during the pre-silicon or post-silicon stages. Pre-silicon analysis benchmarks the IC against a fully defined model, while post-silicon analysis includes logic testing and side-channel analysis [193]. The IC supply chain faces security challenges in addition to HT at various stages, including IP piracy, IC cloning, hardware backdoors, and counterfeit chips. On-chip aging sensors can pick counterfeit chips while split manufacturing mitigates IC overproduction and IP piracy issues [194].
Figure 14 lists a broad classification of hardware security threats and corresponding countermeasures available. Reverse engineering (RE) is analyzing and decomposing edge devices’ design and behavior by extracting confidential data or intellectual property [195]. RE is accomplished by examining various design formats, such as RTL, netlist, layout (GDS-II), mask, or fabricated ICs [189]. It is viable to reverse-trace and refabricate the design, which can be further reused or enhanced [196]. To restrict RE in IC design, hardware obfuscation is the preferred technique that conceals its functionality by placing the logic elements in a random fashion, irregular routing, varying doping concentrations, manipulating dielectric properties, and more [197]. Camouflaging is another option that enables two functional modules to appear identical at the layout level [198]. The adversaries do not physically damage the IoT devices in Side-Channel Attacks (SCA) nor intervene with or modify the system’s operation. SCAs passively monitor specific parameters from sensors or networks, like power consumption, the timing of cryptographic operations, electromagnetic emissions, or acoustic signals [199]. The mitigation techniques against passive SCAs are classified into two groups: hiding and masking. Hiding methods are used for breaking the relation between the processed data and the side-channel leakage, while masking methods disconnect the actual data from the processed data [200]. Counterfeiting is the duplication of hardware devices by cloning or altering with the designs without the approval from its creator. It may lead to functional failures in systems and processes but also negatively impacts sales and profits of the businesses involved. The broader consequences of piracy acts extend to public health, safety, and security [201]. The detection of counterfeit devices is difficult as their response against test inputs remain undisputed even in extensive functional testing. However, these counterfeit devices might have hidden malicious characteristics with intentional malfunctions like "back door" for accessing sensitive data [202]. Hardware metering and auditing is a key defense mechanism against hardware counterfeiting, involving tracking of devices. Certain properties of ICs, like negative temperature bias instability (NBTI), hot carrier injection, and electromigration can be monitored by sensors to identify counterfeit or previously used ICs [203]. PUFs are becoming an integral part in security applications, including chip identification and authentication, secure key generation for lightweight encryption, prevention of hardware piracy and counterfeiting, hardware metering, and intellectual property protection [197].

4.1. Physical Unclonable Functions (PUFs)

Authentication, authorization, and privacy are three essential requirements in an IoT network. Physical Unclonable Functions (PUFs) exploit the inherent randomness created during manufacturing to give a unique ‘digital fingerprint’ for authentication and secret key storage. Each chip has its fingerprint like those in humans, which is created during the fabrication processes. PUF circuits are triggered by a sequence of input bits known as challenges ( C x ) and respond with a sequence of output bits called responses ( R x ). No two chips generate identical responses for a common challenge. The combination of an input challenge and its corresponding response is known as a challenge response Pair (CRP) [206]. The process variations during the manufacturing processes of the PUF circuit have a unique silicon fingerprint. Thus, even common input challenges as shown in Figure 15 result in unique challenge-response pairs (CRPs) for the edge devices [207].
PUF carries out an authentication process for an unknown device in two stages i.e., enrollment and verification stages. PUF module receives the challenge bits from the server and the corresponding response bits are stored back into the server by the PUF circuit during the authentication phase. During the verification stage, the server sends the previously stored challenge bits to the IoT device, and the PUF circuit embedded into the device generates response bits. The generated response bits are compared and matched with the CRP look-up table entries for the authentication of the IoT devices. Also, the response bits are used to extract the secret key to ensure confidentiality during data exchanges [209].
PUFs are classified based on their security capabilities, fabrication methodology, physical characteristics, and delay characteristics. Many researchers have presented a taxonomy of PUF under categories like fabrication process and security as illustrated in Figure 16. PUFs are categorized into two types, strong PUFs (SPUFs) and weak PUFs (WPUFs), depending on the number of CRPs. The number of CRPs in SPUFs scales exponentially and linearly in WPUFs with increasing PUF cells. WPUFs are used in storing secret keys or serve as a seed in a random sequence generator [210], while SPUFs can be used for authentication, ID, or key generation [211]. Arbiter PUFs fall under SPUFs whereas SRAM PUF and butterfly PUF are WPUFs [212]. However, the responses of SPUFs are inherently correlated and highly susceptible to ML attacks, including modeling techniques like logistic regression (LR), support vector machines (SVM), artificial neural networks (ANN), and ANN-based approximation attacks [213]. The variations in the manufacturing process result in silicon and non-silicon PUF types. The fundamental physical properties of silicon PUFs give rise to three types: analog electronic PUFs, memory-based PUFs, and delay-based PUFs [214]. Non-silicon PUFs create unique characteristics by extracting keys from light beams or lasers as well as magnetic field strength and radio frequencies while avoiding the use of electronic signals [215,216].
An arbiter PUF is a delay-based strong PUF that belongs to Silicon PUFs. Figure 17 illustrates an N-stage arbiter PUF made up of n pairs of 2-to-1 multiplexers, with each pair in a stage controlled by identical challenge bits. The output, referred to as the "Response," is determined by the differences in path delays. In a standard N-stage arbiter PUF, a rising edge signal travels through one of the 2 N possible paths, guided by the N-bit "Challenge" inputs. An arbiter generates the final response, typically implemented with a D-latch, which decides the output based on the first signal to arrive [217,218]. Optical PUFs have an edge over other PUF types as they are less noise-sensitive and leverage light diffraction complexity, making them stable and difficult to duplicate [219]. Light acts as the challenge input and generates a unique random pattern as the response [220]. Normally optical structures are not compatible with solid-state integration. However, a recently proposed CMOS imager PUF uses photodiode responsivity under uniform ambient light and dark current variations to generate unique identifiers for camera authentication [221].

4.1.1. Application of PUFs

Physical unclonable functions (PUFs) are used for authentication and secret key storage without needing secure EEPROMs and other expensive hardware. Wang et. al. has proposed a Lattice PUF against ML attacks that leverage on Learning With Errors (LWE) cryptographic problem. The designers proposed to build a pseudo-random number generator that integrates a Physically Obfuscated Key (POK) with a LWE decryption function and a linear-feedback shift register (LFSR) [222]. ML capabilities are utilized in the screening of stable challenges to strong PUFs. Initially, randomly generated challenges tested for stability are chosen as the input and output of the ML model, for extracting stable challenge dataset [223]. Linjun et al. have proposed a lightweight feedback-based anti-ML-attack Physically Unclonable Function (FLAM-PUF) that integrates an arbiter PUF, a Galois LFSR, and basic logic gates. The design employs a 1-bit feedback mechanism to disrupt the training data, increasing complexity and randomness in the CRP set. This obfuscation reduces the CRP correlation and strengthens resistance to ML attacks by introducing non-linear relationships. The researchers reported a 50% prediction accuracy against various ML algorithms, including Support Vector Machines (SVMs), Logistic Regression, and Deep Neural Networks (DNNs) [224]. A comparable design approach utilizing an LFSR and an Arbiter PUF (APUF) is introduced in [225]. A delay difference quantization strategy for Arbiter PUF (DDQ-APUF) is proposed in [226], which employs multiple configurable delay units ( Δ ) along two symmetrical signal transmission paths. The design measures and quantifies the delay difference between these two paths. A configurable delay is introduced along the signal path and gradually increases until the output response of the APUF flips. This quantified delay difference is then used as the PUF response, providing robustness against environmental variations. This design follows the Strict Avalanche Criterion (SAC), ensuring that even a minor alteration in the challenge inputs results in significant and random response changes. Wang et. al. have proposed a dynamically configured hybrid (DCH) PUF by combining the Self-XOR (SX) PUF with Modified Feed-Forward (MFF) PUF. A LFSR is used as a configuration generator, independent of the input challenge. DCH PUF has proven its resilience against diverse ML attacks, including deep neural networks (DNN), logistic regression (LR), and covariance matrix adaptation evolution strategy (CMA-ES) [227]. Zhou et. al. propose to mitigate ML attacks by reducing linear correlation between the CRPs through a matrix encryption technique called Bagua matrices [228]. This technique is implemented on numerous PUF architectures, including APUF, XOR-APUF, and Multiplexer PUF (MPUF). The prediction accuracy of ML attacks almost reduces to 50% through matrix encryptions, like random guessing, and subsequently improving data security and privacy [229]. The method proposed in [230] combines PUF with Paillier homomorphic encryption or ElGamal encryption to secure data exchanges. Encrypting CRPs during transmission ensures that adversaries cannot intercept or decode sensitive information. Homomorphic encryption enables data verification without decryption, further safeguarding against attacks [230]. A CMOS-based PUF is proposed for device authentication integrated with Elliptic Curve Cryptography (ECC). Elliptic Curve Digital Signature Algorithm (ECDSA) is used in message signing, that enables devices to authenticate themselves without a need for error correction or storage of redundant data [231]. Although APUFs are strong, lightweight, and capable of generating a large number of Challenge-Response Pairs (CRPs), they are susceptible to machine learning (ML) attacks. To counter this vulnerability, researchers in [232] have developed a protocol that authenticates both devices and servers by incorporating an APUF in the device and a PUF model on the server. A zero-transistor interface between the device and server generates "ghost bits" that obscure the challenge bits, making it more difficult for attackers to model the PUF accurately. Another research on cryptography methods for improving Strong PUF security and functionality utilizes Erasable PUFs which delete specific Challenge-Response Pairs (CRPs) after their usage [233]. A Configurable Dual State (CDS) PUF, featuring a Feedback Obfuscation Mechanism (FOM), is proposed to enhance hardware efficiency and defend against machine learning-based modeling attacks. The CDS PUF is configured as either a Ring Oscillator (RO) PUF or a Transient Effect Ring Oscillator (TERO) PUF based on the parity of the Hamming weight of the challenge bits. The feedback obfuscation mechanism leverages a stable count value from the RO as a dynamic mask to obscure the input challenge, effectively concealing the relationship between CRPs [234]. A Cyclic Redundancy Check (CRC) PUF alters the seed challenges and transforms the response generation by changing the CRC generator polynomial to mitigate ML-based modeling attacks [235].
A switched-capacitor PUF (SC-PUF) capable of generating stable cryptographic keys leverages metal blocks and capacitive sensing mechanisms. The proposed mechanism protects against invasive physical attacks like focused ion beam (FIB) and probing methods, with a much lower bit error rate (BER) of 10 4 [236]. A low-cost resistor-capacitor (RC) PUF is proposed to sense voltage differences caused by the charging and discharging of RC circuits. The experimental results with RC-PUFs have shown 49% uniqueness while achieving over 98% reliability [237]. Cross-PUF attacks exploit power intake measurements from one PUF instance to compromise another, assuming both PUFs originate from the same design file and manufacturing batch. To defend against these attacks, the DRILL method, introduced in [238], integrates Dual-Rail Logic (DRL) with Random Initialization Logic (RIL). This combination reduces the signal-to-noise ratio (SNR) in the power rails and balances power consumption during the transmission of ‘0’ and ‘1’, making it more difficult for attackers to distinguish between the two states. A fuzzy extraction technique is proposed to authenticate biometric data within a lightweight authentication protocol that utilizes Blockchains and PUFs [239]. This protocol addresses privacy and security risks, offering protection against threats such as man-in-the-middle attacks, replay attacks, and impersonation attempts. Similarly, a hybrid approach that integrates Blockchain and PUFs is used for device authentication and data integrity that uses PUFs to generate unique device fingerprints [240].
Applications of PUFs include [241,242],
  • Identification is an act of claiming identity with a set of attributes, both physical and perceptual, that uniquely define a specific entity. Similar to a biometrical identification scheme, PUF response identification can be used to identify the ICs uniquely. A large range of CRPs is stored in the database along with the device ID implemented with the PUF during enrollment. The verifier chooses a CRP from the CRP database. The identification is considered successful if the obtained response and the CRP database output for a specific input are identical.
  • Authentication is an act of identity confirmation based on presented attributes. PUFs generate a secure key from intrinsic and inherent entropies created due to variations in the fabricating process. No standard non-volatile storage is needed as randomness is built-in inside a chip and assures extra protection against the side channel and probing attacks.
  • SRAM PUFs, RO PUFs, etc., can generate random numbers with slight modifications in their architecture and find their application in real, or cryptographically secure, random number generators.
  • Potential vulnerabilities like copying or reverse engineering can destroy devices’ intrinsic and inherent characteristics and thus modify their output. PUFs are suitable for the generation of secrets in cryptography as they are not kept on the hardware and get generated dynamically at device reset.

4.1.2. PUF Performance Indicators

The quality of a PUF is evaluated by metrics like uniqueness, reliability, randomness, correctness, strict avalanche condition (SAC), etc. that verify its applicability to a specific application. PUF metrics are measured by collecting response bits against a set of challenges to the PUF. A specific application has unique sets of requirements; hence all metrics are not equally important [243,244].
Uniqueness: It is a PUF characteristic representing its ability to generate a unique response against a similar set of challenges subjected to each die in a lot [245]. Uniqueness is the average inter-chip Hamming Distance (HD) of the responses collected from a group of chips. The uniqueness value of an ideal PUF is about 50%, meaning half of the bits in the responses of the PUFs should be different [243]. For example, in an FPGA-based k n-bit, PUF responses: P 1 , P 2 , · · ·, P k , the average Hamming distance is given by Eqn. 3 [82],
u = 2 k ( k 1 ) i = 1 k 1 j = i + 1 k H D P i , P j n × 100 %
Reliability: The PUF, and CRP under noisy and variable environmental conditions are measured by their reliability i.e., the PUF outputs the same response under variable operating conditions. However, numerous environmental conditions like temperature, voltage, and aging of the devices, are responsible for variations in the PUF signatures. The ideal value for reliability is 100% and it can be estimated using eqn. 3.
u = 1 x y = 1 x H D R i , R i , y n × 100 %
where x represents the times of sampling; n is the number of bits of a signature generated by a PUF; R i , y is the y t h sampling of R i .
Randomness: It is a measure of the PUF’s ability to generate 0 or 1 in its response bits with equal probabilities. The randomness of a PUF should be 100% in an ideal case. PUF-based authentication protocols rely heavily on random physical imperfections that occur during the semiconductor manufacturing process, thus creating static randomness. However, the identification (ID) extraction from the PUF gets corrupted due to dynamic randomness sources like noise which reduces the PUF’s reliability [246].
R a n d o m n e s s = 1 P r ( I D = 0 ) P r ( I D = 1 )
For 2 M challenges, the probabilities to obtain an ID at 0 and 1 can be given as,
Randomness = 1 erf E D R σ 2 · M
where D R is the pdf of
i = 1 M d c i i
For a variance of M σ 2 , the randomness expression eqn. 8 is given by [247],
P R ( I D = 0 ) = 1 P R ( I D = 1 )
= P r i = 1 M d c i i < 0
Correctness, Bit Aliasing, Uniformity, and Steadiness are additional PUF performance metrics discussed in the literature [82,243,245].
Table 6, presents a comparison of PUFs performance metrics mentioned in the previous section. It is inferred from the table that the Uniqueness and Uniformity performance metrics of Lattice PUF remain closer to ideal values whereas RC-PUF is the lowest performing one.

4.1.3. PUFs as a Root of Trust

A layered defense model as shown in Figure 18, is preferred for a secure system with outermost layers managing the regular operations of the device and acting as protection barriers for inner layers. This design approach minimizes the attack surface area and makes inner layers easier to secure because they have fewer, highly controlled tasks. The trust-validation sequence continues moving towards inner layers up to the system core, known as the Root of Trust (RoT) [248]. Edge devices leverage RoTs in establishing a protected environment for cryptographic processes needed for data encryption and authenticating devices connected to backend systems [249]. RoT applies various code validation mechanisms before executing the codes on secured CPUs and shields against physical attacks to a certain extent. Thus, a Chain of Trust is established when each component in this chain trusts the codes it runs, as they get validated by the previous link, creating an unbroken line of trust back to the root of trust [250,251]. The hardware RoT secures EC operations, by providing the cryptographic keys in a booting process. Hardware-based RoT is typically a small, dedicated chip embedded within an IoT device leveraging upon intrinsic hardware characteristics [252]. PUFs are ideal for hardware-based RoT that hosts cryptographic functions, such as private and public key encryption [253]. The unique keys generated from the edge device’s PUF and the secure boot process ensure that only authorized firmware or updates are loaded, preventing trojan or malware attacks.
Rojas et al. proposed a hardware Root-of-Trust (RoT) architecture utilizing a Xilinx Zynq-7000 SoC FPGA and integrating various cryptographic components. These components include PUFs for device authentication, the Advanced Encryption Standard (AES) for data encryption, Secure Hash Algorithms (SHA-2 and SHA-3) for ensuring data integrity, and the Edwards-curve Digital Signature Algorithm (EdDSA) for digital signature verification [254]. A hardware RoT is proposed in [255] leveraging Quantum Tunneling PUFs for the digital identification of ICs. In contrast to SRAM PUFs, Quantum Tunneling PUFs operate without the need for error correction. The software-based PUF (SW-PUF) combines physical chip variations with delays in software instructions to generate unique IDs within a secure Root of Trust (RoT). This approach supports secure boot and remote attestation, ensuring that only authenticated, tamper-free software is executed [256]. A secured IoT architecture proposed in [257] combines PUF with Trusted Platform Module (TPM), and Tangle Distributed Ledger Technology (DLT acts as a RoT, establishing a unique digital identity for each device. The proposed architecture implements a Security-by-Design (SbD) approach at the hardware level strengthens attack resistance and defends device and data integrity. Quantum channels are vulnerable to diverse noise sources, which include environmental interactions and eavesdropping attempts. A key reconciliation protocol is proposed in [258], allowing transmission of bits stream through insecure and noisy quantum channels. Also, the researchers claim that the proposed protocol can reconcile two PUF responses obtained from the same challenge but at a different time. Also, minor noise levels in the PUF responses are mitigated through the application of fuzzy extractor, designed to produce stable cryptographic keys from marginally erratic PUF responses [259].

4.1.4. Integration of FPGAs Based PUFs with Edge AI

Artificial Intelligence (AI) assisted data analytics at the edge, allowing for improved interpretation of raw and unstructured data from the physical world. AI in the edge has the potential to automate complex and advanced tasks while preventing user-sensitive transmitted over the network and into data centers at the same time. Edge AI models human reasoning, thus enabling machines to sense, comprehend, perform intelligent detection, and transmit results to the cloud for long-term storage or big-data processing. It is capable of recognizing and fighting back against cyberattacks as well as other cyber threats based on the continuous input of data, identifying patterns, and backtracking the attacks. Data privacy and security breaches need to be seriously taken as they may cause business interruptions, revenue losses, and panic among the public [260]. The human brain comprises nearly 100 billion neurons and over 100 trillion connections are established to form a network of neurons which in turn significantly influences the brain’s capabilities. The interconnectivity within an FPGA resembles the neural wiring of the human brain and its programmable-logic fabric offers the flexibility of the brain [261].
The dynamically reconfigurable as well as customizable hardware architecture of Field Programmable Gate Arrays (FPGAs) has offered a promising solution in accelerating compute-intensive workloads [39]. FPGA-based edge network accelerators offload intelligence, data processing, analytics, and communication capabilities from the cloud to where the data originates [262]. Cloud computing provides the infrastructure needed for securing users’ data as well as maintaining their integrity and privacy. However, there is no foolproof technique yet that guarantees data protection nor a processor that can isolate the execution of users’ applications from data theft. FPGAs on the other are capable of providing stronger security guarantees as there is no need to involve vulnerable operating systems, drivers, or compilers, nor any other system software [263].
The possibility of incorporating general-purpose processors such as soft cores on FPGAs makes these reconfigurable devices suitable for IoT applications as they can provide solutions with enhanced security, reduced size, energy consumption, and cost [264]. Silicon chip fabricators and designers have integrated FPGA and ARM processor cores for efficient edge AI processing. Also, the benefits of shorter development time make an FPGA-based solution the ideal choice for an intelligent edge device [265]. Integrated chip manufacturers mostly outsource their operations where intellectual property (IP) theft poses serious concerns. In contrast, FPGA designers do not configure them with sensitive IPs unless the delivery of the product is completed [266]. Cybercriminals can replicate FPGA applications by intercepting their programming bitstream or reading the internal memory. Modern FPGAs have started using advanced encryption key standard (AES) with the battery-backed SRAM 256-bit or 384-bit security key, AES with the eFUSE key, on-chip bitstream keyed-Hash Message Authentication Code (HMAC) algorithm, bitstream authentication, etc. can mitigate the risks, protect intellectual property, and improve the overall safety of your FPGA devices.
FPGA-based edge devices exploit AI and ML capabilities for the processing of sensed data and subsequently reduce network bandwidth requirements and dependence on cloud processing. Also, vendors are providing IP cores like OpenVINO, Vitis-AI, etc., to leverage FPGA interfaces for the optimization and deployment of deep learning (DL) models [267]. Open Visual Inference and Neural Network Optimization (OpenVINO) is an open-source toolkit from Intel, that facilitates quicker inference of deep learning models on hardware accelerators and easy heterogeneous execution across numerous hardware platforms. Deployment of the OpenVINO toolkit and the Intel FPGA AI Suite in the development of DL-enhanced embedded systems on multiple FPGA-accelerated servers is shown in Figure 19. The OpenVINO toolkit comprises tools and libraries that utilize techniques like pruning, quantization, etc. for the optimization of neural networks. The basic workflow of Intel Distribution of the OpenVINO toolkit is:
  • Model Optimizer converts models from various frameworks like Caffe, TensorFlow, Open Neural Network Exchange (ONNX), and Kaldi to intermediate representation format for faster inference.
  • Inference Engine reads the IR format and supports heterogeneous execution across different hardware architectures such as CPU, GPU, Integrated GPU, etc.
  • Model Zoo is a common interface for heterogeneous hardware that contains examples to get started with OpenVINO quickly.
Xilinx Vitis is a unified software platform that includes optimized IP, tooling, and libraries to grant users access to AI inference acceleration through adaptable hardware. It consists of a rich set of AI models, optimized deep learning processor unit (DPU) cores, tools, libraries, and example designs for AI at the edge and in the data center. It provides a unified programming model for accelerating Edge, Cloud, and Hybrid computing applications. Vitis AI integrated development environment is presented in Figure 20, with the target platform i.e., FPGAs as the base layer. The Xilinx runtime library in the second layer controls the data movement across domains. Also, compilers are used in the layer for mapping the AI model’s optimal instruction set and dataflow model as well as carrying out optimization tasks. There are more than 400 optimized and open-source applications across eight Vitis libraries that are defined in the third layer and offer out-of-the-box acceleration with minimal to zero code changes to your existing applications [268].

5. Open Research Issues

The motivation of this section is to introduce research open challenges and opportunities in the security and privacy issues related to the EC paradigm. The centralized computational approach in data centers and hyperscale clouds is robust against security threats as it ‘hides’ the user’s data behind layers of security defenses, both virtually and physically. However, EC faces many security challenges and here we present some of the open research challenges as well as the scope for further work [101].
  • Heterogeneous EC architecture: The users in a traditional cloud computing approach are masked from hardware in place and how software/ applications performance depends on hardware resources. EC introduces complexity and a need for multi-layered security schemes because of an assortment of standards and protocols [269]. It introduces the need for unique data propagation management schemes among the heterogeneous edge devices [126]. Data privacy is achievable through encryption techniques, but EC architecture makes the existing encryption schemes too cumbersome for the limited processing resources [270].
  • Dynamic resources allocation: Contrarily to cloud computing, the resources in the EC network are rather limited; thus, static allocation techniques cannot achieve optimal resource utilization. The dynamic allocation of computing and storage resources in a distributed EC network remains a bigger challenge. The resource allocation strategy in EC is important for ensuring efficient and effective use of resources and maintaining the quality of service (QoS) for applications that demand real-time data processing and low-latency response. The task of partitioning in EC not only poses the challenge of optimal partitioning but also faces challenges in dynamic resource allocation without the computational, storage capacity, or location of edge nodes.
  • Data abstraction: The edge node needs a certain amount of training data to carry out analysis tasks. Data abstraction carries out data preprocessing techniques like noise cancellation, data classification, and data computation. Heterogeneous devices use different data formats and data security algorithms cannot be fed with a complete set of raw data, but it should only abstract the relevant part. Storage is a limiting factor while selecting the size of raw data and prediction accuracy. The selection of an optimal data abstraction technique is not easy because of the heterogeneity of devices, different data formats, and different corresponding operations.
  • Secured EC nodes: Devices in an EC network need a foolproof access control and an end-to-end threat protection mechanism. Edge security refers to device security, network security, data security, and application-level security focused mainly on the protection and privacy of user data. Mitigation strategies include first the risks definition, uncompromised device functionality, multiuser edge node security, and minimal service levels at user nodes.
  • Federated learning (FL): FL refers to a secured ML technique in a distributed environment comprising scattered edge devices or servers while ensuring the user data does not leave the source premises [271]. The research for full-proof privacy and attack mitigation techniques remains a focus of FL. In addition to data security challenges, the communication overhead of FL is comparable to computational overhead. The two significant attacks against FL are poisoning attacks and byzantine attacks. The poisoning attack includes the act of tampering, destroying, or corrupting the edge data used in local training or model generation [272]. Poisoning attacks are relevant to a single edge node or a server, while byzantine attacks are prevalent in the collusion of multi-users distributed learning environment [273].

6. Conclusion

Our current research thoroughly examined and summarized the challenges related to data security and privacy preservation in EC, along with corresponding countermeasures. We also discussed the advantages and limitations of integrated EC and IoT paradigms. Furthermore, we performed an in-depth analysis of security and privacy issues within EC-assisted IoT networks, including a comprehensive survey of potential security attacks and their countermeasures. We researched how state-of-the-art technologies PUFs, AI, IoT, and ML can mitigate security-related challenges in an EC paradigm. Given that resource-limited edge devices may not support traditional cryptographic security solutions, lightweight security primitives like PUFs are an alternative solution for low-cost key generation. Additionally, we conducted a detailed examination of AI/ ML-based security mechanisms, categorizing them extensively. We also provided insights into commercially available toolkits from leading manufacturers and developers utilized in deploying EC services. Finally, we identified open research directions and gaps in data security and privacy issues within EC, outlining areas for future investigation and development.

Author Contributions

Conceptualization, A.M.S, M.R.I. and M.H.H; methodology, A.M.S., M.H.H, M.R.I., and A.K.; formal analysis, A.M.S, S.A.Z., and M.H.H; investigation, A.M.S, S.A.Z., and A.R.B.N; resources, A.M.S, M.R.I., and A.K.; data curation, A.M.S., and M.H.H.; writing—original draft preparation, A.M.S, and M.H.H.; writing—review and editing, A.M.S, M.R.I., M.H.H., A.K., S.A.Z., and A.R.B.N; visualization, A.M.S. and M.H.H; supervision, M.R.I. and M.H.H., and A.K.; project administration, A.M.S; funding acquisition, A.M.S., and A.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work is part of the A’Sharqiyah University, Oman - Internal Research Grant (IRG-16), 2024-26 "Intrusion detection in an IoT network through Machine Learning (ML) of hardware characteristics"

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AES Advanced Encryption Key Standard
AMQP Advanced Message Queuing Protocol
BR-PUF Bistable ring PUF
CN-PUF Carbon nanotube-based PUF
CO-PUF Computational optical PUF
CRP Challenge Response Pair
DDoS Distributed Denial-of-Service
DL Deep Learning
DP Differential Privacy
DPU Deep Learning Processor Unit
EC Edge Computing
FL Federated Learning
GDPR General Data Protection Regulation
HD Hamming Distance
HE Homomorphic Encryption
HMAC Hash Message Authentication Code
ICN Information-Centric Networking
IDS Intrusion Detection System
MCC Mobile Cloud Computing
MEC Multi-Access Edge Computing
MECCA-PUF Memory Cell-based Chip Authentication PUF
ML Machine Learning
MNO Mobile Network Operators
MQTT Message Queue Telemetry Transport
MVL-PUF Multiple-valued logic PUF
NEM-PUF Nano-electromechanical PUF
ONNX Open Neural Network Exchange
OpenVINO Open Visual Inference and Neural Network Optimization
PE-PUF Process and environmental PUF
PH-PUF Photonic PUF
PRISMA Preferred Reporting Items for Systematic Reviews and Meta-Analyses
PUFs Physically Unclonable Functions
RF-DNA-PUF Radio-frequency certificates of authenticity
RRAM-PUF reconfigurable resistive RAM PUF
RTMS Realtime Traffic Monitoring Systems
SAC Strict Avalanche Condition
SASE Secure Access Service Edge
SC-PUF ScanPUF
SDN Software Defined Networking
SEACOD Selective Encryption and Component-Oriented Deduplication
TERO-PUF Transient effect ring oscillator PUF
VMs Virtual Machines
WBI Web-Based Intermediaries

References

  1. IMD. What is the internet of things (IoT) & why is it important? https://www.imd.org/blog/digital-transformation/internet-of-things/, year = 2024 (accessed September 17, 2024).
  2. Vailshery, L.S. Number of IoT connections worldwide 2022-2033. https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/, year = 2024 (accessed September 17, 2024).
  3. Albreem, M.A.; Sheikh, A.M.; Alsharif, M.H.; Jusoh, M.; Mohd Yasin, M.N. Green Internet of Things (GIoT): Applications, Practices, Awareness, and Challenges. IEEE Access 2021, 9, 38833–38858. [Google Scholar] [CrossRef]
  4. sptel. Future Development of IoT in Singapore – 2024 & Beyond. https://sptel.com/future-development-of-iot/, year = 2024 (accessed September 15, 2024).
  5. Sheikh, A.M.; Islam, M.R.; Habaebi, M.H.; Kabbani, A.; Zabidi, S.A.; bin Najeeb, A.R. Securing the IoT Edge Devices Using Advanced Digital Technologies. Asian Journal of Electrical and Electronic Engineering 2024, 4, 52–60. [Google Scholar] [CrossRef]
  6. Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A survey on the edge computing for the Internet of Things. IEEE access 2017, 6, 6900–6919. [Google Scholar] [CrossRef]
  7. Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet of Things Journal 2020, 8, 4004–4022. [Google Scholar] [CrossRef]
  8. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet of Things journal 2016, 3, 637–646. [Google Scholar] [CrossRef]
  9. Shi, W.; Dustdar, S. The Promise of Edge Computing. Computer 2016, 49, 78–81. [Google Scholar] [CrossRef]
  10. Yahuza, M.; Idris, M.Y.I.B.; Wahab, A.W.B.A.; Ho, A.T.; Khan, S.; Musa, S.N.B.; Taha, A.Z.B. Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities. IEEE Access 2020, 8, 76541–76567. [Google Scholar] [CrossRef]
  11. Shi, W.; Dustdar, S. The promise of edge computing. Computer 2016, 49, 78–81. [Google Scholar] [CrossRef]
  12. Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and privacy in fog computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
  13. Chen, B.; Wan, J.; Celesti, A.; Li, D.; Abbas, H.; Zhang, Q. Edge Computing in IoT-Based Manufacturing. IEEE Communications Magazine 2018, 56, 103–109. [Google Scholar] [CrossRef]
  14. Premsankar, G.; Di Francesco, M.; Taleb, T. Edge computing for the Internet of Things: A case study. IEEE Internet of Things Journal 2018, 5, 1275–1284. [Google Scholar] [CrossRef]
  15. Mo, W.; Wang, T.; Zhang, S.; Zhang, J. An active and verifiable trust evaluation approach for edge computing. Journal of Cloud Computing 2020, 9, 1–19. [Google Scholar] [CrossRef]
  16. Liao, H.; Zhou, Z.; Zhao, X.; Zhang, L.; Mumtaz, S.; Jolfaei, A.; Ahmed, S.H.; Bashir, A.K. Learning-based context-aware resource allocation for edge-computing-empowered industrial IoT. IEEE Internet of Things Journal 2019, 7, 4260–4277. [Google Scholar] [CrossRef]
  17. Zhang, J.; Chen, B.; Zhao, Y.; Cheng, X.; Hu, F. Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE access 2018, 6, 18209–18237. [Google Scholar] [CrossRef]
  18. Rupanetti, D.; Kaabouch, N. Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities. Applied Sciences 2024, 14, 7104. [Google Scholar] [CrossRef]
  19. Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proceedings of the IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
  20. Yao, A.; Li, G.; Li, X.; Jiang, F.; Xu, J.; Liu, X. Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions. Array 2023, 19, 100293. [Google Scholar] [CrossRef]
  21. Rao, F.Y.; Bertino, E. Privacy techniques for edge computing systems. Proceedings of the IEEE 2019, 107, 1632–1654. [Google Scholar] [CrossRef]
  22. Lyu, M.; Ni, Z.; Chen, Q.; Li, F. Edge-DPSDG: An Edge-based Differential Privacy Protection Model for Smart Healthcare. IEEE Transactions on Big Data 2024. [Google Scholar] [CrossRef]
  23. Jiang, B.; Li, J.; Wang, H.; Song, H. Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression. IEEE Transactions on Industrial Informatics 2021, 19, 1136–1144. [Google Scholar] [CrossRef]
  24. Zerraza, I.; Seghir, Z.A.; Hemam, M. An Efficient Lightweight Authentication and Access Control for IoT Edge Devices. International Journal of Safety & Security Engineering 2024, 14. [Google Scholar]
  25. Rostampour, S.; Bagheri, N.; Bendavid, Y.; Safkhani, M.; Kumari, S.; Rodrigues, J.J. An authentication protocol for next generation of constrained Iot systems. IEEE Internet of Things Journal 2022, 9, 21493–21504. [Google Scholar] [CrossRef]
  26. Ding, X.; Wang, X.; Xie, Y.; Li, F. A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things. IEEE Internet of Things Journal 2021, 9, 1818–1829. [Google Scholar] [CrossRef]
  27. Bourechak, A.; Zedadra, O.; Kouahla, M.N.; Guerrieri, A.; Seridi, H.; Fortino, G. At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives. Sensors 2023, 23, 1639. [Google Scholar] [CrossRef]
  28. Chang, Z.; Liu, S.; Xiong, X.; Cai, Z.; Tu, G. A survey of recent advances in edge-computing-powered artificial intelligence of things. IEEE Internet of Things Journal 2021, 8, 13849–13875. [Google Scholar] [CrossRef]
  29. Huh, J.H.; Seo, Y.S. Understanding edge computing: Engineering evolution with artificial intelligence. IEEE Access 2019, 7, 164229–164245. [Google Scholar] [CrossRef]
  30. Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal 2020, 7, 7457–7469. [Google Scholar] [CrossRef]
  31. Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hossain, M.S. A secure data aggregation strategy in edge computing and blockchain-empowered internet of things. IEEE Internet of Things Journal 2020, 9, 14237–14246. [Google Scholar] [CrossRef]
  32. Wang, J.; Wu, L.; Choo, K.K.R.; He, D. Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics 2019, 16, 1984–1992. [Google Scholar] [CrossRef]
  33. Bai, F.; Shen, T.; Yu, Z.; Zeng, K.; Gong, B. Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the IIoE. IEEE Internet of Things Journal 2021, 9, 14752–14766. [Google Scholar] [CrossRef]
  34. Li, B.; Chen, T.; Giannakis, G.B. Secure mobile edge computing in IoT via collaborative online learning. IEEE Transactions on Signal Processing 2019, 67, 5922–5935. [Google Scholar] [CrossRef]
  35. Wang, K.; Yin, H.; Quan, W.; Min, G. Enabling collaborative edge computing for software defined vehicular networks. IEEE network 2018, 32, 112–117. [Google Scholar] [CrossRef]
  36. Zhang, P.; Wang, Y.; Kumar, N.; Jiang, C.; Shi, G. A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems. IEEE Transactions on Computational Social Systems 2021, 9, 97–108. [Google Scholar] [CrossRef]
  37. Begg, R. Digital Supply Chain: Cybersecurity Report Flags Clear and Present Danger. https://www.machinedesign.com/automation-iiot/article/21236851/netscout-digital-supply-chain-cybersecurity-report-flags-clear-and-present-danger/, year = 2022 (Accessed: (September 17, 2022)).
  38. Jovanovic, B. Internet of Things statistics for 2022 - Taking Things Apart. https://dataprot.net/statistics/iot-statistics/#:~:text=Malware%20attacks%20are%20now%20affecting,a%20third%20of%20infected%20devices., year = 2022 (accessed September 17, 2022).
  39. Manan, A. Implementation of image processing algorithm on FPGA. Akgec Journal of Technology 2006, 2, 25–28. [Google Scholar]
  40. Biookaghazadeh, S.; Zhao, M.; Ren, F. Are {FPGAs} Suitable for Edge Computing? In Proceedings of the USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), 2018.
  41. Sipola, T.; Alatalo, J.; Kokkonen, T.; Rantonen, M. Artificial intelligence in the IoT era: A review of edge AI hardware and software. In Proceedings of the 2022 31st Conference of Open Innovations Association (FRUCT). IEEE, 2022, pp. 320–331.
  42. Jiang, S.; He, D.; Yang, C.; Xu, C.; Luo, G.; Chen, Y.; Liu, Y.; Jiang, J. Accelerating mobile applications at the network edge with software-programmable FPGAs. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2018, pp. 55–62.
  43. Zhao, H.; Ratazzi, P. A Lightweight Hardware-Assisted Security Method for eFPGA Edge Devices. IEEE Internet of Things Journal 2024.
  44. Ngo, D.M.; Temko, A.; Murphy, C.C.; Popovici, E. FPGA hardware acceleration framework for anomaly-based intrusion detection system in IoT. In Proceedings of the 2021 31st International Conference on Field-Programmable Logic and Applications (FPL). IEEE, 2021, pp. 69–75.
  45. Zhang, Y.; Zhu, M.; Yang, B.; Liu, L. A Highly Reliable Strong Physical Unclonable Function Design Based on FPGA. In Proceedings of the Journal of Physics: Conference Series. IOP Publishing, 2020, Vol. 1619, p. 012003.
  46. Xu, T.; Potkonjak, M. Robust and flexible FPGA-based digital PUF. In Proceedings of the 2014 24th International Conference on Field Programmable Logic and Applications (FPL). IEEE; 2014; pp. 1–6. [Google Scholar]
  47. Guajardo, J.; Kumar, S.S.; Schrijen, G.J.; Tuyls, P. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the International workshop on cryptographic hardware and embedded systems. Springer; 2007; pp. 63–80. [Google Scholar]
  48. Kang, H.; Hori, Y.; Satoh, A. Performance evaluation of the first commercial PUF-embedded RFID. In Proceedings of the The 1st IEEE Global Conference on Consumer Electronics 2012. IEEE; 2012; pp. 5–8. [Google Scholar]
  49. Suh, G.E.; Devadas, S. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 2007 44th ACM/IEEE Design Automation Conference. IEEE; 2007; pp. 9–14. [Google Scholar]
  50. Alkabani, Y.; Koushanfar, F.; Potkonjak, M. Remote activation of ICs for piracy prevention and digital right management. In Proceedings of the 2007 IEEE/ACM International Conference on Computer-Aided Design. IEEE; 2007; pp. 674–677. [Google Scholar]
  51. Keele, S.; et al. Guidelines for performing systematic literature reviews in software engineering, 2007.
  52. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; PRISMA Group*, t. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Annals of internal medicine 2009, 151, 264–269. [Google Scholar] [CrossRef]
  53. Liu, D.; Yan, Z.; Ding, W.; Atiquzzaman, M. A survey on secure data analytics in edge computing. IEEE Internet of Things Journal 2019, 6, 4946–4967. [Google Scholar] [CrossRef]
  54. Xu, Z.; Liu, W.; Huang, J.; Yang, C.; Lu, J.; Tan, H. Artificial intelligence for securing IoT services in edge computing: a survey. Security and communication networks 2020, 2020, 1–13. [Google Scholar] [CrossRef]
  55. Lee, J.H.; Kim, H. Security and privacy challenges in the internet of things [security and privacy matters]. IEEE Consumer Electronics Magazine 2017, 6, 134–136. [Google Scholar] [CrossRef]
  56. Anandakumar, N.N.; Hashmi, M.S.; Tehranipoor, M. FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures. Integration 2021, 81, 175–194. [Google Scholar] [CrossRef]
  57. Lounis, K.; Zulkernine, M. More Lessons: Analysis of PUF-based Authentication Protocols for IoT. Cryptology ePrint Archive, Paper 2021/1509, 2021. https://eprint.iacr.org/2021/1509.
  58. Majzoobi, M.; Koushanfar, F.; Potkonjak, M.; Tehranipoor, M.; Wang, C. FPGA-oriented Security. Introduction to Hardware Security and Trust, 2011; 195–231. [Google Scholar]
  59. Merenda, M.; Porcaro, C.; Iero, D. Edge machine learning for ai-enabled iot devices: A review. Sensors 2020, 20, 2533. [Google Scholar] [CrossRef]
  60. Ansari, M.S.; Alsamhi, S.H.; Qiao, Y.; Ye, Y.; Lee, B. Security of distributed intelligence in edge computing: Threats and countermeasures. In The cloud-to-thing continuum; Palgrave Macmillan, Cham, 2020; pp. 95–122.
  61. El-Saleh, A.A.; Sheikh, A.M.; Albreem, M.A.; Honnurvali, M.S. The Internet of Medical Things (IoMT): opportunities and challenges. Wireless Networks, 2024; 1–18. [Google Scholar]
  62. Liu, H.; Zhang, Y.; Yang, T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Network 2018, 32, 78–83. [Google Scholar] [CrossRef]
  63. Bonnah, E.; Shiguang, J. DecChain: A decentralized security approach in Edge Computing based on Blockchain. Future Generation Computer Systems 2020, 113, 363–379. [Google Scholar] [CrossRef]
  64. Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges. IEEE Communications Surveys & Tutorials 2019, 21, 1508–1532. [Google Scholar] [CrossRef]
  65. Luo, C.; Xu, L.; Li, D.; Wu, W. Edge computing integrated with blockchain technologies. In Complexity and Approximation; Springer, 2020; pp. 268–288.
  66. Mendki, P. Blockchain enabled iot edge computing: Addressing privacy, security and other challenges. In Proceedings of the Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, 2020, pp. 63–67.
  67. Kotevska, O.; Johnson, J.; Kusne, A.G. Analyzing Data Privacy for Edge Systems. In Proceedings of the 2022 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE; 2022; pp. 223–228. [Google Scholar]
  68. Paillet, D. An Overview of Cybersecurity Best Practices for Edge Computing. Technical report, Schneider Electric, 2021.
  69. Beekman, J. How to Deal with Edge Computing Security Concerns, 2022.
  70. van der Walt, S.; Venter, H. Research gaps and opportunities for secure access service edge. In Proceedings of the International Conference on Cyber Warfare and Security, 2022, Vol. 17, pp. 609–619.
  71. Singh, S.; Sulthana, R.; Shewale, T.; Chamola, V.; Benslimane, A.; Sikdar, B. Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey. IEEE Internet of Things Journal 2022, 9, 236–260. [Google Scholar] [CrossRef]
  72. Waguie, F.T.; Al-Turjman, F. Artificial intelligence for edge computing security: A survey. In Proceedings of the 2022 International Conference on Artificial Intelligence in Everything (AIE). IEEE; 2022; pp. 446–450. [Google Scholar]
  73. Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proceedings of the IEEE 2019, 107, 1738–1762. [Google Scholar] [CrossRef]
  74. Lin, F.; Zhou, Y.; An, X.; You, I.; Choo, K.K.R. Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices. IEEE Consumer Electronics Magazine 2018, 7, 45–50. [Google Scholar] [CrossRef]
  75. Spadaccino, P.; Cuomo, F. Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning. arXiv preprint arXiv:2012.01174, arXiv:2012.01174 2020.
  76. Singh, A.; Chatterjee, K.; Satapathy, S.C. An edge based hybrid intrusion detection framework for mobile edge computing. Complex & Intelligent Systems 2022, 8, 3719–3746. [Google Scholar]
  77. Alsubhi, K. A Secured Intrusion Detection System for Mobile Edge Computing. Applied Sciences 2024, 14, 1432. [Google Scholar] [CrossRef]
  78. Gyamfi, E.; Jurcut, A. Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors 2022, 22, 3744. [Google Scholar] [CrossRef]
  79. Long, J.; Liang, W.; Li, K.C.; Zhang, D.; Tang, M.; Luo, H. PUF-based anonymous authentication scheme for hardware devices and IPs in edge computing environment. IEEE Access 2019, 7, 124785–124796. [Google Scholar] [CrossRef]
  80. Aarella, S.G.; Mohanty, S.P.; Kougianos, E.; Puthal, D. PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing. In Proceedings of the 2022 IEEE International Symposium on Smart Electronic Systems (iSES). IEEE; 2022; pp. 433–438. [Google Scholar]
  81. Chen, Z.; Wu, M.; Zhou, Y.; Li, R.; Tan, J.; Ding, D. Puf-cim: Sram-based compute-in-memory with zero bit-error-rate physical unclonable function for lightweight secure edge computing. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2023, 31, 1234–1247. [Google Scholar] [CrossRef]
  82. Zhang, J.L.; Wu, Q.; Ding, Y.P.; Lv, Y.Q.; Zhou, Q.; Xia, Z.H.; Sun, X.M.; Wang, X.W. Techniques for design and implementation of an FPGA-specific physical unclonable function. Journal of Computer Science and Technology 2016, 31, 124–136. [Google Scholar] [CrossRef]
  83. Zhu, C.; Zhu, X.; Ren, J.; Qin, T. Blockchain-enabled federated learning for UAV edge computing network: Issues and solutions. Ieee Access 2022, 10, 56591–56610. [Google Scholar] [CrossRef]
  84. Nguyen, T.; Nguyen, H.; Gia, T.N. Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications. Journal of Network and Computer Applications, 103884. [Google Scholar]
  85. Song, S.; Choi, B.Y.; Kim, D. Selective encryption and component-oriented deduplication for mobile cloud data computing. In Proceedings of the 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE; 2016; pp. 1–5. [Google Scholar]
  86. Zhao, Y.; Wang, W.; Li, Y.; Meixner, C.C.; Tornatore, M.; Zhang, J. Edge computing and networking: A survey on infrastructures and applications. IEEE Access 2019, 7, 101213–101230. [Google Scholar] [CrossRef]
  87. Cheng, G.; Chen, Y.; Deng, S.; Gao, H.; Yin, J. A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing. IEEE Transactions on Computational Social Systems 2022, 9, 146–158. [Google Scholar] [CrossRef]
  88. Zeyu, H.; Geming, X.; Zhaohang, W.; Sen, Y. Survey on Edge Computing Security. In Proceedings of the 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE); 2020; pp. 96–105. [Google Scholar] [CrossRef]
  89. Mollah, M.B.; Azad, M.A.K.; Vasilakos, A. Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Computing 2017, 4, 34–42. [Google Scholar] [CrossRef]
  90. Bhat, S.A.; Sofi, I.B.; Chi, C.Y. edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities. IEEE Access 2020, 8, 205340–205373. [Google Scholar] [CrossRef]
  91. Microsoft. What is edge computing? https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-edge-computing/, year = 2022 (accessed October 18, 2022).
  92. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet of Things Journal 2016, 3, 637–646. [Google Scholar] [CrossRef]
  93. Mohanan, R. What Is Edge Computing? Components, Examples, and Best Practices. https://www.spiceworks.com/tech/edge-computing/articles/what-is-edge-computing/ , year = 2022 (accessed October 18, 2022).
  94. Hemminger, S.; et al. Network emulation with NetEm. In Proceedings of the Linux conf au. Citeseer, 2005, Vol. 5, p. 2005.
  95. Li, W.; Chen, Z.; Gao, X.; Liu, W.; Wang, J. Multimodel framework for indoor localization under mobile edge computing environment. IEEE Internet of Things Journal 2018, 6, 4844–4853. [Google Scholar] [CrossRef]
  96. Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Future Generation Computer Systems 2019, 97, 219–235. [Google Scholar] [CrossRef]
  97. Toczé, K.; Nadjm-Tehrani, S. A taxonomy for management and optimization of multiple resources in edge computing. Wireless Communications and Mobile Computing 2018, 2018. [Google Scholar] [CrossRef]
  98. Albreem, M.A.; Sheikh, A.M.; Bashir, M.J.; El-Saleh, A.A. Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: Current practices, challenges and future prospective. Wireless Networks 2023, 29, 539–567. [Google Scholar] [CrossRef]
  99. Varghese, B.; Wang, N.; Barbhuiya, S.; Kilpatrick, P.; Nikolopoulos, D.S. Challenges and opportunities in edge computing. In Proceedings of the 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE; 2016; pp. 20–26. [Google Scholar]
  100. howpublished = https://sunkur.medium.com/challenges-in-edge-computing-ec9237b5ab77, year = 2022 (accessed November 12, 2022), S.R. Challenges in Edge Computing.
  101. Kong, L.; Tan, J.; Huang, J.; Chen, G.; Wang, S.; Jin, X.; Zeng, P.; Khan, M.K.; Das, S.K. Edge-Computing-Driven Internet of Things: A Survey. ACM Computing Surveys (CSUR) 2022. [Google Scholar] [CrossRef]
  102. Schäfer, D.; Edinger, J.; VanSyckel, S.; Paluska, J.M.; Becker, C. Tasklets: Overcoming heterogeneity in distributed computing systems. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE; 2016; pp. 156–161. [Google Scholar]
  103. Carvalho, G.; Cabral, B.; Pereira, V.; Bernardino, J. Edge computing: current trends, research challenges and future directions. Computing 2021, 103, 993–1023. [Google Scholar] [CrossRef]
  104. Sun, J.; Gu, Q.; Zheng, T.; Dong, P.; Qin, Y. Joint communication and computing resource allocation in vehicular edge computing. International Journal of Distributed Sensor Networks 2019, 15, 1550147719837859. [Google Scholar] [CrossRef]
  105. Jia, M.; Zhang, L.; Wu, J.; Guo, Q.; Gu, X. Joint computing and communication resource allocation for edge computing towards Huge LEO networks. China Communications 2022, 19, 73–84. [Google Scholar] [CrossRef]
  106. Ning, Z.; Huang, J.; Wang, X.; Rodrigues, J.J.; Guo, L. Mobile edge computing-enabled internet of vehicles: Toward energy-efficient scheduling. IEEE Network 2019, 33, 198–205. [Google Scholar] [CrossRef]
  107. Wang, X.; Han, Y.; Leung, V.C.; Niyato, D.; Yan, X.; Chen, X. Convergence of edge computing and deep learning: A comprehensive survey. IEEE Communications Surveys & Tutorials 2020, 22, 869–904. [Google Scholar]
  108. Chen, H.; Qin, W.; Wang, L. Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey. Journal of Cloud Computing 2022, 11, 1–19. [Google Scholar] [CrossRef]
  109. Saeik, F.; Avgeris, M.; Spatharakis, D.; Santi, N.; Dechouniotis, D.; Violos, J.; Leivadeas, A.; Athanasopoulos, N.; Mitton, N.; Papavassiliou, S. Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions. Computer Networks 2021, 195, 108177. [Google Scholar] [CrossRef]
  110. Feng, M.; Krunz, M.; Zhang, W. Task partitioning and user association for latency minimization in mobile edge computing networks. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE; 2021; pp. 1–6. [Google Scholar]
  111. Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A survey of security in cloud, edge, and fog computing. Sensors 2022, 22, 927. [Google Scholar] [CrossRef] [PubMed]
  112. Sha, K.; Yang, T.A.; Wei, W.; Davari, S. A survey of edge computing-based designs for IoT security. Digital Communications and Networks 2020, 6, 195–202. [Google Scholar]
  113. Ahmadi, S. Security Implications of Edge Computing in Cloud Networks. Ahmadi, S.(2024) Security Implications of Edge Computing in Cloud Networks. Journal of Computer and Communications 2024, 12, 26–46. [Google Scholar]
  114. Accenture. Edge Computing. https://www.accenture.com/bg-en/insights/cloud/edge-computing-index, year = 2024 (accessed September 15, 2024).
  115. Abhishek, A.; Adeniyi-Jones, C.; Van Hensbergen, E.; Balmakhtar, M. Accounting and resource scheduling at the edge. HotEdge’20, 2020. [Google Scholar]
  116. Ahmed, E.; Ahmed, A.; Yaqoob, I.; Shuja, J.; Gani, A.; Imran, M.; Shoaib, M. Bringing Computation Closer toward the User Network: Is Edge Computing the Solution? IEEE Communications Magazine 2017, 55, 138–144. [Google Scholar] [CrossRef]
  117. howpublished = https://itsecuritywire.com/featured/edge-computing-four-cybersecurity-challenges-in-2022/, year = 2022 (accessed February 8, 2023), U.S. Edge Computing: Four Cybersecurity Challenges in 2022.
  118. Wu, W.; Zhang, Q.; Wang, H.J. Edge computing security protection from the perspective of classified protection of cybersecurity. In Proceedings of the 2019 6th International Conference on Information Science and Control Engineering (ICISCE). IEEE; 2019; pp. 278–281. [Google Scholar]
  119. Mall, A.; Singh, P.; Thute, A.; Khapre, S.P.; Shankar, A. Security issues of edge computing in IoT. In Proceedings of the Proceedings of International Conference on Machine Intelligence and Data Science Applications: MIDAS 2020. Springer, 2021, pp. 567–579.
  120. Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials 2021, 23, 1078–1124. [Google Scholar]
  121. Uddin, R.; Kumar, S.A.; Chamola, V. Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions. Ad Hoc Networks 2024, 152, 103322. [Google Scholar]
  122. Fazeldehkordi, E.; Grønli, T.M. A Survey of Security Architectures for Edge Computing-Based IoT. IoT 2022, 3, 332–365. [Google Scholar] [CrossRef]
  123. Hassan, N.; Gillani, S.; Ahmed, E.; Yaqoob, I.; Imran, M. The Role of Edge Computing in Internet of Things. IEEE Communications Magazine 2018, 56, 110–115. [Google Scholar] [CrossRef]
  124. Alwakeel, A.M. An overview of fog computing and edge computing security and privacy issues. Sensors 2021, 21, 8226. [Google Scholar] [CrossRef]
  125. Guynes, S.; Parrish, J.; Vedder, R. Edge computing societal privacy and security issues. Acm Sigcas Computers and Society 2020, 48, 11–12. [Google Scholar] [CrossRef]
  126. Mukherjee, M.; Matam, R.; Mavromoustakis, C.X.; Jiang, H.; Mastorakis, G.; Guo, M. Intelligent edge computing: Security and privacy challenges. IEEE Communications Magazine 2020, 58, 26–31. [Google Scholar] [CrossRef]
  127. Zhu, W.; Zhou, C.; Jiang, L. A Trusted Internet of Things Access Scheme for Cloud Edge Collaboration. Electronics 2024, 13, 1026. [Google Scholar] [CrossRef]
  128. howpublished = https://www.xsoccorp.com/post/data-encryption-for-the-edge, year = 2021 (accessed June 19, 2023), R.B. Data Encryption for the Edge.
  129. Kwon, H.; Hahn, C.; Kim, D.; Hur, J. Secure deduplication for multimedia data with user revocation in cloud storage. Multimedia Tools and Applications 2017, 76, 5889–5903. [Google Scholar] [CrossRef]
  130. Neto, E.C.P.; Dadkhah, S.; Ghorbani, A.A. Sustainable and Secure Optimization of Load Distribution in Edge Computing. In Proceedings of the 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET). IEEE; 2022; pp. 040–045. [Google Scholar]
  131. Li, D.; Zhang, E.; Lei, M.; Song, C. Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering 2022, 19, 4196–4216. [Google Scholar] [CrossRef]
  132. Wu, Y.; Dai, H.N.; Wang, H. Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet of Things Journal 2020, 8, 2300–2317. [Google Scholar] [CrossRef]
  133. Dong, J.; Song, C.; Zhang, T.; Li, Y.; Zheng, H. Integration of edge computing and blockchain for provision of data fusion and secure big data analysis for Internet of Things. Wireless Communications and Mobile Computing 2022, 2022, 9233267. [Google Scholar] [CrossRef]
  134. Ding, X.; Guo, J.; Li, D.; Wu, W. Pricing and budget allocation for IoT blockchain with edge computing. IEEE Transactions on Cloud Computing 2022, 11, 1608–1621. [Google Scholar] [CrossRef]
  135. Medhane, D.V.; Sangaiah, A.K.; Hossain, M.S.; Muhammad, G.; Wang, J. Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach. IEEE Internet of Things Journal 2020, 7, 6143–6149. [Google Scholar] [CrossRef]
  136. Wang, S.; Liu, Z.; Wang, H.; Wang, J. Ensuring security in edge computing through effective blockchain node detection. Journal of Cloud Computing 2023, 12, 1–16. [Google Scholar] [CrossRef]
  137. Xu, X.; Zhang, X.; Gao, H.; Xue, Y.; Qi, L.; Dou, W. BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Transactions on Industrial Informatics 2019, 16, 4187–4195. [Google Scholar] [CrossRef]
  138. Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Transactions on Industrial Informatics 2019, 16, 7081–7093. [Google Scholar] [CrossRef]
  139. Gao, Q.; Xiao, J.; Cao, Y.; Deng, S.; Ouyang, C.; Feng, Z. Blockchain-based collaborative edge computing: efficiency, incentive and trust. Journal of Cloud Computing 2023, 12, 72. [Google Scholar] [CrossRef]
  140. Mandarino, V.; Pappalardo, G.; Tramontana, E. A Blockchain-Based Electronic Health Record (EHR) System for Edge Computing Enhancing Security and Cost Efficiency. Computers 2024, 13, 132. [Google Scholar] [CrossRef]
  141. Xiong, Z.; Zhang, Y.; Niyato, D.; Wang, P.; Han, Z. When mobile blockchain meets edge computing. IEEE Communications Magazine 2018, 56, 33–39. [Google Scholar] [CrossRef]
  142. Spadaccino, P.; Cuomo, F.; et al. Intrusion detection systems for iot: opportunities and challenges offered by edge computing. Journal on Future and Evolving Technologies 2022. [Google Scholar] [CrossRef]
  143. Mahadevappa, P.; Murugesan, R.K.; Al-Amri, R.; Thabit, R.; Al-Ghushami, A.H.; Alkawsi, G. A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX 2024, 12, 102597. [Google Scholar] [CrossRef]
  144. howpublished = https://www.trentonsystems.com/blog/is-edge-computing-secure, year = 2020 (accessed January 14, 2023), B.D. Is Edge Computing Secure?
  145. Xia, Q.; Tao, Z.; Li, Q. Privacy issues in edge computing. In Fog/Edge Computing For Security, Privacy, and Applications; Springer, 2021; pp. 147–169.
  146. Adil, M.; Almaiah, M.A.; Omar Alsayed, A.; Almomani, O. An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors 2020, 20, 2311. [Google Scholar] [CrossRef]
  147. Liang, F.; Hatcher, W.G.; Liao, W.; Gao, W.; Yu, W. Machine learning for security and the internet of things: the good, the bad, and the ugly. IEEE Access 2019, 7, 158126–158147. [Google Scholar] [CrossRef]
  148. Sheikh, A.M.; Islam, M.R.; Habaebi, M.H.; Zabidi, S.A.; Najeeb, A.R.B.; Basahel, A. Machine Learning (ML) assisted Edge security framework on FPGAs. In Proceedings of the 2023 9th International Conference on Computer and Communication Engineering (ICCCE). IEEE; 2023; pp. 155–160. [Google Scholar]
  149. Meuser, T.; Lovén, L.; Bhuyan, M.; Patil, S.G.; Dustdar, S.; Aral, A.; Bayhan, S.; Becker, C.; de Lara, E.; Ding, A.Y.; et al. Revisiting Edge AI: Opportunities and Challenges. IEEE Internet Computing 2024, 28, 49–59. [Google Scholar] [CrossRef]
  150. Mendez, J.; Bierzynski, K.; Cuéllar, M.; Morales, D.P. Edge Intelligence: Concepts, Architectures, Applications, and Future Directions. ACM Transactions on Embedded Computing Systems (TECS) 2022, 21, 1–41. [Google Scholar] [CrossRef]
  151. Wang, C.; Yuan, Z.; Zhou, P.; Xu, Z.; Li, R.; Wu, D.O. The security and privacy of mobile edge computing: An artificial intelligence perspective. IEEE Internet of Things Journal 2023. [Google Scholar] [CrossRef]
  152. Xu, D.; Li, T.; Li, Y.; Su, X.; Tarkoma, S.; Jiang, T.; Crowcroft, J.; Hui, P. Edge intelligence: Empowering intelligence to the edge of network. Proceedings of the IEEE 2021, 109, 1778–1837. [Google Scholar] [CrossRef]
  153. Raimundo, R.; Rosário, A. The impact of artificial intelligence on data system security: A literature review. Sensors 2021, 21, 7029. [Google Scholar] [CrossRef] [PubMed]
  154. Montini, H. Artificial Intelligence in Cybersecurity: How to Use The Technology. https://www.provendata.com/blog/ai-in-cybersecurity/ , year = 2024 (accessed October 8, 2024).
  155. Alowais, S.A.; Alghamdi, S.S.; Alsuhebany, N.; Alqahtani, T.; Alshaya, A.I.; Almohareb, S.N.; Aldairem, A.; Alrashed, M.; Bin Saleh, K.; Badreldin, H.A.; et al. Revolutionizing healthcare: the role of artificial intelligence in clinical practice. BMC medical education 2023, 23, 689. [Google Scholar] [CrossRef] [PubMed]
  156. Wang, F.; Zhang, M.; Wang, X.; Ma, X.; Liu, J. Deep learning for edge computing applications: A state-of-the-art survey. IEEE Access 2020, 8, 58322–58336. [Google Scholar] [CrossRef]
  157. Sun, Y.; Ochiai, H.; Esaki, H. Decentralized deep learning for multi-access edge computing: A survey on communication efficiency and trustworthiness. IEEE Transactions on Artificial Intelligence 2021, 3, 963–972. [Google Scholar] [CrossRef]
  158. Wu, H.; Han, H.; Wang, X.; Sun, S. Research on artificial intelligence enhancing internet of things security: A survey. Ieee Access 2020, 8, 153826–153848. [Google Scholar] [CrossRef]
  159. Kulin, M.; Kazaz, T.; De Poorter, E.; Moerman, I. A Survey on Machine Learning-Based Performance Improvement of Wireless Networks: PHY, MAC and Network Layer. Electronics 2021, 10, 318. [Google Scholar] [CrossRef]
  160. Hua, H.; Li, Y.; Wang, T.; Dong, N.; Li, W.; Cao, J. Edge Computing with Artificial Intelligence: A Machine Learning Perspective. ACM Computing Surveys 2023, 55, 1–35. [Google Scholar] [CrossRef]
  161. Munir, A.; Blasch, E.; Kwon, J.; Kong, J.; Aved, A. Artificial intelligence and data fusion at the edge. IEEE Aerospace and Electronic Systems Magazine 2021, 36, 62–78. [Google Scholar] [CrossRef]
  162. Sedjelmaci, H.; Senouci, S.M.; Ansari, N.; Boualouache, A. A trusted hybrid learning approach to secure edge computing. IEEE Consumer Electronics Magazine 2021, 11, 30–37. [Google Scholar] [CrossRef]
  163. Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002; pp. 148–160.
  164. Shamsoshoara, A.; Korenda, A.; Afghah, F.; Zeadally, S. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Computer Networks 2020, 183, 107593. [Google Scholar] [CrossRef]
  165. Murphy, D. The Role of Machine Learning in Data Security. https://www.lepide.com/blog/the-role-of-machine-learning-in-data-security/, year = 2023 (accessed January 24, 2024).
  166. Rigaki, M.; Garcia, S. A survey of privacy attacks in machine learning. ACM Computing Surveys 2023, 56, 1–34. [Google Scholar] [CrossRef]
  167. Shen, T.; Ding, L.; Sun, J.; Jing, C.; Guo, F.; Wu, C. Edge Computing for IoT Security: Integrating Machine Learning with Key Agreement. In Proceedings of the 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE); 2023; pp. 474–483. [Google Scholar] [CrossRef]
  168. Nassif, A.B.; Talib, M.A.; Nasir, Q.; Dakalbab, F.M. Machine learning for anomaly detection: A systematic review. Ieee Access 2021, 9, 78658–78700. [Google Scholar] [CrossRef]
  169. Murshed, M.S.; Murphy, C.; Hou, D.; Khan, N.; Ananthanarayanan, G.; Hussain, F. Machine learning at the network edge: A survey. ACM Computing Surveys (CSUR) 2021, 54, 1–37. [Google Scholar] [CrossRef]
  170. Brecko, A.; Kajati, E.; Koziorek, J.; Zolotova, I. Federated learning for edge computing: A survey. Applied Sciences 2022, 12, 9124. [Google Scholar] [CrossRef]
  171. Abreha, H.G.; Hayajneh, M.; Serhani, M.A. Federated learning in edge computing: a systematic survey. Sensors 2022, 22, 450. [Google Scholar] [CrossRef]
  172. Feng, Y.; Qi, Y.; Li, H.; Wang, X.; Tian, J. Leveraging federated learning and edge computing for recommendation systems within cloud computing networks. In Proceedings of the Third International Symposium on Computer Applications and Information Systems (ISCAIS 2024). SPIE, 2024, Vol. 13210, pp. 279–287.
  173. Li, X.; Wu, W. Recent Advances of Blockchain and Its Applications. Journal of Social Computing 2022, 3, 363–394. [Google Scholar] [CrossRef]
  174. Moore, E.; Imteaj, A.; Rezapour, S.; Amini, M.H. A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing. IEEE Internet of Things Journal, 2023; 1–1. [Google Scholar] [CrossRef]
  175. Ni, S.; He, Y.; Chen, L.; Wang, Y.; Yu, F. A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning. In Proceedings of the 2023 International Conference on Networking and Network Applications (NaNA); 2023; pp. 116–121. [Google Scholar] [CrossRef]
  176. Wang, R.; Lai, J.; Zhang, Z.; Li, X.; Vijayakumar, P.; Karuppiah, M. Privacy-preserving federated learning for internet of medical things under edge computing. IEEE journal of biomedical and health informatics 2022, 27, 854–865. [Google Scholar] [CrossRef]
  177. Mahbub, M.; Gazi, M.S.A.; Provat, S.A.A.; Islam, M.S. Multi-access edge computing-aware internet of things: MEC-IoT. In Proceedings of the 2020 Emerging Technology in Computing, Communication and Electronics (ETCCE). IEEE; 2020; pp. 1–6. [Google Scholar]
  178. Zhang, P.; Durresi, M.; Durresi, A. Mobile privacy protection enhanced with multi-access edge computing. In Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE; 2018; pp. 724–731. [Google Scholar]
  179. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A survey on mobile edge computing: The communication perspective. IEEE communications surveys & tutorials 2017, 19, 2322–2358. [Google Scholar]
  180. Zhang, Y.; Zhang, Y. The Future of Mobile Edge Computing. Mobile Edge Computing, 2022; 81–105. [Google Scholar]
  181. Ortega-Fernandez, I.; Martinez, S.E.K.; Orellana, L.A.; Soldatos, J.; Kyriazis, D. Large Scale Data Anonymisation for GDPR Compliance. Big Data and Artificial Intelligence in Digital Finance, 2022; 325. [Google Scholar]
  182. Regulation, G.D.P. General data protection regulation (GDPR). Intersoft Consulting, Accessed in October 2018, 24. [Google Scholar]
  183. howpublished = https://cloud.google.com/dlp/docs/concepts-bucketing#:~:text=Generalization%20is%20the%20process%20of,depending%20on%20the%20data%20type., year = accessed 1st Feb 2024, G.C. Generalization and bucketing.
  184. Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2019, 2, 1–22. [Google Scholar] [CrossRef]
  185. Cybersecurity, A. Intrusion Detection Systems (IDS) explained. https://cybersecurity.att.com/solutions/intrusion-detection-system/ids-explained, year = 2024 (accessed September 17, 2024).
  186. Arisdakessian, S.; Wahab, O.A.; Mourad, A.; Otrok, H.; Guizani, M. A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions. IEEE Internet of Things Journal 2022, 10, 4059–4092. [Google Scholar] [CrossRef]
  187. Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Internet of things: Security and solutions survey. Sensors 2022, 22, 7433. [Google Scholar] [CrossRef] [PubMed]
  188. Sidhu, S.; Mohd, B.J.; Hayajneh, T. Hardware security in IoT devices with emphasis on hardware trojans. Journal of Sensor and Actuator Networks 2019, 8, 42. [Google Scholar] [CrossRef]
  189. Hu, W.; Chang, C.H.; Sengupta, A.; Bhunia, S.; Kastner, R.; Li, H. An overview of hardware security and trust: Threats, countermeasures, and design tools. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2020, 40, 1010–1038. [Google Scholar] [CrossRef]
  190. Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
  191. Yang, K.; Blaauw, D.; Sylvester, D. Hardware designs for security in ultra-low-power IoT systems: An overview and survey. IEEE Micro 2017, 37, 72–89. [Google Scholar] [CrossRef]
  192. Cirne, A.; Sousa, P.R.; Resende, J.S.; Antunes, L. Hardware security for IoT identity assurance. development 2021, 9, 11. [Google Scholar]
  193. Pourrahmani, H.; Yavarinasab, A.; Monazzah, A.M.H.; et al. A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain. Internet of Things 2023, 23, 100888. [Google Scholar] [CrossRef]
  194. Jin, Y. Introduction to hardware security. Electronics 2015, 4, 763–784. [Google Scholar] [CrossRef]
  195. Rahman, M.T.; Shi, Q.; Tajik, S.; Shen, H.; Woodard, D.L.; Tehranipoor, M.; Asadizanjani, N. Physical inspection & attacks: New frontier in hardware security. In Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW). IEEE, 2018, pp. 93–102.
  196. Aqeel, M.; Ali, F.; Iqbal, M.W.; Rana, T.A.; Arif, M.; Auwul, M.R. A review of security and privacy concerns in the internet of things (IoT). Journal of Sensors 2022, 2022, 5724168. [Google Scholar] [CrossRef]
  197. Japa, A.; Majumder, M.K.; Sahoo, S.K.; Vaddi, R.; Kaushik, B.K. Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap. IEEE Circuits and Systems Magazine 2021, 21, 4–30. [Google Scholar] [CrossRef]
  198. Li, K.F.; Attarmoghaddam, N. Challenges and methodologies of hardware security. In Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE; 2018; pp. 928–933. [Google Scholar]
  199. Tsvetanov, F. Sensor network hardware security. In Proceedings of the AIP Conference Proceedings. AIP Publishing, 2022, Vol. 2570.
  200. Batina, L.; Jauernig, P.; Mentens, N.; Sadeghi, A.R.; Stapf, E. INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security. In Proceedings of the 2019 56th ACM/IEEE Design Automation Conference (DAC); 2019; pp. 1–4. [Google Scholar]
  201. Hassija, V.; Chamola, V.; Gupta, V.; Jain, S.; Guizani, N. A survey on supply chain security: Application areas, security threats, and solution architectures. IEEE Internet of Things Journal 2020, 8, 6222–6246. [Google Scholar] [CrossRef]
  202. Obeng, Y.; Nolan, C.; Brown, D. Hardware security through chain assurance. In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE); 2016; pp. 1535–1537. [Google Scholar]
  203. Akter, S.; Khalil, K.; Bayoumi, M. Hardware security in the internet of things: A survey. In Proceedings of the 2023 IEEE 36th International System-on-Chip Conference (SOCC). IEEE; 2023; pp. 1–6. [Google Scholar]
  204. Maharmeh, H.A.; Alhawari, M.; Hung, C.C.; Ismail, M. Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. International Journal of Multimedia Intelligence and Security 2019, 3, 271–292. [Google Scholar] [CrossRef]
  205. Akter, S.; Khalil, K.; Bayoumi, M. A survey on hardware security: Current trends and challenges. IEEE Access 2023, 11, 77543–77565. [Google Scholar] [CrossRef]
  206. Babaei, A.; Schiele, G. Physical unclonable functions in the internet of things: State of the art and open challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef]
  207. Shariffuddin, S.; Sivamangai, N.; Napolean, A.; Naveenkumar, R.; Kamalnath, S.; Saranya, G. Review on Arbiter Physical Unclonable Function and its Implementation in FPGA for IoT Security Applications. In Proceedings of the 2022 6th International Conference on Devices, Circuits and Systems (ICDCS); 2022; pp. 369–374. [Google Scholar] [CrossRef]
  208. Bergfalck, L.; Engström, J. Designing a Physical Unclonable Function for Cryptographic Hardware, 2021.
  209. Al-Meer, A.; Al-Kuwari, S. Physical Unclonable Functions (PUF) for IoT Devices. arXiv preprint arXiv:2205.08587, arXiv:2205.08587 2022.
  210. Liu, Y.; Xie, Y.; Bao, C.; Srivastava, A. A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2017, 26, 73–81. [Google Scholar] [CrossRef]
  211. Shah, N.; Chatterjee, D.; Sapui, B.; Mukhopadhyay, D.; Basu, A. Introducing Recurrence in Strong PUFs for Enhanced Machine Learning Attack Resistance. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2021, 11, 319–332. [Google Scholar] [CrossRef]
  212. Xu, Y.; Lao, Y.; Liu, W.; Zhang, Z.; You, X.; Zhang, C. Mathematical Modeling Analysis of Strong Physical Unclonable Functions. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2020, 39, 4426–4438. [Google Scholar] [CrossRef]
  213. Ma, X.; Wang, P.; Li, G.; Zhou, Z. Machine learning attacks resistant strong PUF design utilizing response obfuscates challenge with lower hardware overhead. Microelectronics Journal 2023, 142, 105977. [Google Scholar] [CrossRef]
  214. Cao, Y.; Xu, J.; Wu, J.; Wu, S.; Huang, Z.; Zhang, K. Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review. Mathematics 2023, 12, 77. [Google Scholar] [CrossRef]
  215. Su, H. Novel design in mixed-signal and machine learning resilient architecture physical unclonable functions. PhD thesis, University of Southampton, 2021.
  216. Magyari, A.; Chen, Y. Integrating Lorenz Hyperchaotic Encryption with Ring Oscillator Physically Unclonable Functions (RO-PUFs) for High-Throughput Internet of Things (IoT) Applications. Electronics 2023, 12, 4929. [Google Scholar] [CrossRef]
  217. Zhuang, Y.; Mursi, K.T.; Gaoxiang, L. A challenge obfuscating interface for arbiter PUF variants against machine learning attacks. arXiv preprint arXiv:2103.12935, 2021; arXiv:2103.12935 2021. [Google Scholar]
  218. Avvaru, S.V.S.; Zhou, C.; Satapathy, S.; Lao, Y.; Kim, C.H.; Parhi, K.K. Estimating delay differences of arbiter PUFs using silicon data. In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE); 2016; pp. 543–546. [Google Scholar]
  219. Wang, K.; Shi, J.; Lai, W.; He, Q.; Xu, J.; Ni, Z.; Liu, X.; Pi, X.; Yang, D. All-silicon multidimensionally-encoded optical physical unclonable functions for integrated circuit anti-counterfeiting. Nature Communications 2024, 15, 3203. [Google Scholar] [CrossRef]
  220. Chung, M.K.; Kim, M.U.; Han, J.W.; Yang, J.S.; Kim, B.J.; Jo, M.S.; Jung, S.Y.; Kim, S.H.; Yoon, J.B. Contribution of MEMS to Physical Unclonable Functions (PUFs): Random Configuration of PDMS Nano-Structure for Optical PUF. In Proceedings of the 2024 IEEE 37th International Conference on Micro Electro Mechanical Systems (MEMS); 2024; pp. 521–524. [Google Scholar] [CrossRef]
  221. Lu, X.; Hong, L.; Sengupta, K. CMOS optical PUFs using noise-immune process-sensitive photonic crystals incorporating passive variations for robustness. IEEE Journal of Solid-State Circuits 2018, 53, 2709–2721. [Google Scholar] [CrossRef]
  222. Wang, Y.; Xi, X.; Orshansky, M. Lattice PUF: A strong physical unclonable function provably secure against machine learning attacks. In Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE; 2020; pp. 273–283. [Google Scholar]
  223. Zhou, Z.; Li, G.; Wang, P. A challenge-screening strategy for enhancing the stability of strong PUF based on machine learning. Microelectronics Journal 2023, 131, 105667. [Google Scholar] [CrossRef]
  224. Wu, L.; Hu, Y.; Zhang, K.; Li, W.; Xu, X.; Chang, W. Flam-puf: A response–feedback-based lightweight anti-machine-learning-attack puf. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022, 41, 4433–4444. [Google Scholar] [CrossRef]
  225. Zhu, B.; Jiang, X.; Huang, K.; Yu, M. A Response-Feedback-Based Strong PUF with Improved Strict Avalanche Criterion and Reliability. Sensors 2023, 24, 93. [Google Scholar] [CrossRef]
  226. Wang, Y.; Zhang, G.; Mei, X.; Gu, C. A High-Reliability, Non-CRP-Discard Arbiter PUF Based on Delay Difference Quantization. IEEE Transactions on Circuits and Systems I: Regular Papers, 2024; 1–13. [Google Scholar] [CrossRef]
  227. Wang, Y.; Wang, C.; Gu, C.; Cui, Y.; O’Neill, M.; Liu, W. A dynamically configurable PUF and dynamic matching authentication protocol. IEEE Transactions on Emerging Topics in Computing 2021, 10, 1091–1104. [Google Scholar] [CrossRef]
  228. Zhou, Z.; Wang, P.; Li, G. Bagua Protocol: A Whole-Process Configurable Protocol for IoT Sensing Devices Security Based on Strong PUF. IEEE Internet of Things Journal 2024, 11, 805–819. [Google Scholar] [CrossRef]
  229. Zhou, Z.; Li, G.; Wang, P.; Ye, M. Matrix encryption based anti-machine learning attack algorithm for strong PUF. In Proceedings of the 2021 IEEE 14th International Conference on ASIC (ASICON). IEEE; 2021; pp. 1–4. [Google Scholar]
  230. Tun, N.W.; Mambo, M. Secure PUF-Based Authentication Systems. Sensors 2024, 24, 5295. [Google Scholar] [CrossRef]
  231. Felicetti, C.; Lanuzza, M.; Rullo, A.; Saccà, D.; Crupi, F. Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC. In Proceedings of the 2021 IEEE International Conference on Smart Internet of Things (SmartIoT); 2021; pp. 229–236. [Google Scholar] [CrossRef]
  232. Zhuang, Y.; Li, G. A lightweight PUF-based authentication protocol. arXiv preprint arXiv:2405.13146, arXiv:2405.13146 2024.
  233. Jin, C.; Burleson, W.; van Dijk, M.; Rührmair, U. Programmable access-controlled and generic erasable PUF design and its applications. Journal of Cryptographic Engineering 2022, 12, 413–432. [Google Scholar] [CrossRef]
  234. Li, H.; Cao, W.; Wang, C.; Zhu, X.; Liao, G.; He, Z. FOM-CDS PUF: A Novel Configurable Dual State Strong PUF Based on Feedback Obfuscation Mechanism against Modeling Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023, 106, 1311–1321. [Google Scholar] [CrossRef]
  235. Dubrova, E.; Näslund, O.; Degen, B.; Gawell, A.; Yu, Y. CRC-PUF: A machine learning attack resistant lightweight PUF construction. In Proceedings of the 2019 IEEE European symposium on security and privacy workshops (EuroS&PW). IEEE, 2019, pp. 264–271.
  236. Zhang, Y.; He, Z.; Wan, M.; Liu, J.; Gu, H.; Zou, X. A SC PUF standard cell used for key generation and anti-invasive-attack protection. IEEE Transactions on Information Forensics and Security 2021, 16, 3958–3973. [Google Scholar] [CrossRef]
  237. Lee, S.; Oh, M.K.; Kang, Y.; Choi, D. RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devices. In Proceedings of the Information Security Applications: 20th International Conference, WISA 2019, Revised Selected Papers 20. Springer, 2020, pp. 275–285. Jeju Island, South Korea, 21–24 August 2019. [Google Scholar]
  238. Kroeger, T.; Cheng, W.; Guilley, S.; Danger, J.L.; Karimi, N. Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2022, 30, 187–200. [Google Scholar] [CrossRef]
  239. Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet of Things Journal 2021, 9, 8883–8891. [Google Scholar] [CrossRef]
  240. Asif, R.; Ghanem, K.; Irvine, J. Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy. Sensors 2020, 21, 28. [Google Scholar] [CrossRef]
  241. Choi, S.; Zage, D.; Choe, Y.R.; Wasilow, B. Physically Unclonable Digital ID. In Proceedings of the 2015 IEEE International Conference on Mobile Services. IEEE; 2015; pp. 105–111. [Google Scholar]
  242. P, S.; Krishnammal, P.M. Study of different silicon Physical Unclonable Functions. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET); 2016; pp. 81–85. [Google Scholar] [CrossRef]
  243. Joshi, S.; Mohanty, S.P.; Kougianos, E. Everything you wanted to know about PUFs. IEEE Potentials 2017, 36, 38–46. [Google Scholar] [CrossRef]
  244. Ram, S.K.; Sahoo, S.R.; Das, B.B.; Mahapatra, K.; Mohanty, S.P. Securing Things: A Novel CRO Applicable in PUF and Recycled IC Detection. 2022. [Google Scholar]
  245. Bhargava, M. Reliable, secure, efficient physical unclonable functions. PhD thesis, Carnegie Mellon University, 2013.
  246. Schaub, A.; Danger, J.L.; Rioul, O.; Guilley, S. The big picture of delay-PUF dependability. In Proceedings of the 2020 European Conference on Circuit Theory and Design (ECCTD). IEEE; 2020; pp. 1–4. [Google Scholar]
  247. Jouini, Z.C.; Danger, J.L.; Bossuet, L. Performance evaluation of physically unclonable function by delay statistics. In Proceedings of the 2011 IEEE 9th International New Circuits and systems conference. IEEE; 2011; pp. 482–485. [Google Scholar]
  248. Fedorkow, G.; Hardjono, T. Mind Your Roots of Trust! Authorea Preprints 2024. [Google Scholar]
  249. CYSEC. Securing Edge Devices: The Crucial Role of Root of Trust in a Connected World. https://www.cysec.com/iot-edge/, year = accessed October 30, 2024.
  250. Knowledge Center, S.E. Root of Trust: Trusted environment for secure functions. https://semiengineering.com/knowledge_centers/semiconductor-security/root-of-trust/, year = accessed October 30, 2024.
  251. Zimmer, V.; Krau, M. Establishing the root of trust. UEFI. org document dated August 2016. [Google Scholar]
  252. Ehret, A.; Moore, P.; Stojkov, M.; Kinsy, M.A. Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures. In Proceedings of the 2023 IEEE High Performance Extreme Computing Conference (HPEC). IEEE; 2023; pp. 1–7. [Google Scholar]
  253. Chaintoutis, C.; Akriotou, M.; Mesaritakis, C.; Komnios, I.; Karamitros, D.; Fragkos, A.; Syvridis, D. Optical PUFs as physical root of trust for blockchain-driven applications. IET Software 2019, 13, 182–186. [Google Scholar] [CrossRef]
  254. Rojas-Muñoz, L.F.; Sánchez-Solano, S.; Martínez-Rodríguez, M.C.; Camacho-Ruiz, E.; Navarro-Torrero, P.; Karmakar, A.; Fernández-García, C.; Tena-Sánchez, E.; Potestad-Ordóñez, F.E.; Casado-Galán, A.; et al. Cryptographic Security Through a Hardware Root of Trust. In Proceedings of the International Symposium on Applied Reconfigurable Computing. Springer; 2024; pp. 106–119. [Google Scholar]
  255. Chuang, K.K.H.; Chen, H.M.; Wu, M.Y.; Yang, E.C.S.; Hsu, C.C.H. Quantum Tunneling PUF: A Chip Fingerprint for Hardware Security. In Proceedings of the 2021 International Symposium on VLSI Technology, Systems and Applications (VLSI-TSA); 2021; pp. 1–2. [Google Scholar] [CrossRef]
  256. Hamadeh, H.; Tyagi, A. Physical unclonable functions (pufs) entangled trusted computing base. In Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS). IEEE; 2019; pp. 177–180. [Google Scholar]
  257. Bathalapalli, V.K.; Mohanty, S.P.; Kougianos, E.; Iyer, V.; Rout, B. PUFchain 4. 0: Integrating PUF-based TPM in distributed ledger for security-by-design of IoT. In Proceedings of the Proceedings of the Great Lakes Symposium on VLSI 2023, 2023, pp. 231–236. [Google Scholar]
  258. Colombier, B.; Bossuet, L.; Fischer, V.; Hély, D. Key reconciliation protocols for error correction of silicon PUF responses. IEEE Transactions on Information Forensics and Security 2017, 12, 1988–2002. [Google Scholar] [CrossRef]
  259. Schrijen, G.J.; Garlati, C. Physical unclonable functions to the rescue. Proceedings of the Embedded World 2018. [Google Scholar]
  260. Dave McCarthy, P.R.; Kanaracus, C. Increasing Intelligence at the Edge with AI. Technical report, International Data Corporation (IDC), 2022.
  261. Ahmad, J.; Jervis, M.; Venkata, R. Intel® FPGAs and SoCs with Intel® FPGA AI Suite and OpenVINO Toolkit Drive Embedded/Edge AI/Machine Learning Applications.
  262. Xu, C.; Jiang, S.; Luo, G.; Sun, G.; An, N.; Huang, G.; Liu, X. The Case for FPGA-Based Edge Computing. IEEE Transactions on Mobile Computing 2022, 21, 2610–2619. [Google Scholar] [CrossRef]
  263. Al-Asli, M.; Elrabaa, M.E.; Abu-Amara, M. FPGA-based symmetric re-encryption scheme to secure data processing for cloud-integrated internet of things. IEEE Internet of Things Journal 2018, 6, 446–457. [Google Scholar] [CrossRef]
  264. Martínez-Rodríguez, M.C.; Rojas-Muñoz, L.F.; Camacho-Ruiz, E.; Sánchez-Solano, S.; Brox, P. Efficient RO-PUF for generation of identifiers and keys in resource-constrained embedded systems. Cryptography 2022, 6, 51. [Google Scholar] [CrossRef]
  265. Mukhtar, N.; Mehrabi, A.; Kong, Y.; Anjum, A. Edge enhanced deep learning system for IoT edge device security analytics. Concurrency and Computation: Practice and Experience 2021, p. e6764.
  266. Huffmire, T.; Brotherton, B.; Sherwood, T.; Kastner, R.; Levin, T.; Nguyen, T.D.; Irvine, C. Managing security in FPGA-based embedded systems. IEEE Design & Test of Computers 2008, 25, 590–598. [Google Scholar]
  267. Kolosov, D.; Kelefouras, V.; Kourtessis, P.; Mporas, I. Anatomy of Deep Learning Image Classification and Object Detection on Commercial Edge Devices: A Case Study on Face Mask Detection. IEEE Access 2022, 10, 109167–109186. [Google Scholar] [CrossRef]
  268. Vitis AI Library User Guide - UG1354 (v2.0) January 20, 2022. pp. 1–401.
  269. Rahman, A.; Hassanain, E.; Hossain, M.S. Towards a secure mobile edge computing framework for Hajj. IEEE Access 2017, 5, 11768–11781. [Google Scholar] [CrossRef]
  270. Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An overview on edge computing research. IEEE access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
  271. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 2019, 10, 1–19. [Google Scholar] [CrossRef]
  272. Cui, Z.; Zhao, P.; Hu, Z.; Cai, X.; Zhang, W.; Chen, J. An improved matrix factorization based model for many-objective optimization recommendation. Information Sciences 2021, 579, 1–14. [Google Scholar] [CrossRef]
  273. Zhai, K.; Ren, Q.; Wang, J.; Yan, C. Byzantine-robust federated learning via credibility assessment on non-IID data. arXiv preprint arXiv:2109.02396, arXiv:2109.02396 2021.
Figure 1. A typical IoT architecture.
Figure 1. A typical IoT architecture.
Preprints 149800 g001
Figure 2. IoT’s attack model.
Figure 2. IoT’s attack model.
Preprints 149800 g002
Figure 3. PRISMA chart.
Figure 3. PRISMA chart.
Preprints 149800 g003
Figure 4. Edge Computing Architecture
Figure 4. Edge Computing Architecture
Preprints 149800 g004
Figure 5. Projected edge devices growth.
Figure 5. Projected edge devices growth.
Preprints 149800 g005
Figure 6. Security functionalities in a cloud-edge computing architecture.
Figure 6. Security functionalities in a cloud-edge computing architecture.
Preprints 149800 g006
Figure 7. Percentage share of attacks on edge network.
Figure 7. Percentage share of attacks on edge network.
Preprints 149800 g007
Figure 8. Security threats classification in EC
Figure 8. Security threats classification in EC
Preprints 149800 g008
Figure 9. Security functionalities in a cloud-edge computing architecture.
Figure 9. Security functionalities in a cloud-edge computing architecture.
Preprints 149800 g009
Figure 10. AI taxonomy.
Figure 10. AI taxonomy.
Preprints 149800 g010
Figure 11. EC and AI: Benefiting each other [160].
Figure 11. EC and AI: Benefiting each other [160].
Preprints 149800 g011
Figure 12. (a) Centralized and (b) distributed training approaches.
Figure 12. (a) Centralized and (b) distributed training approaches.
Preprints 149800 g012
Figure 13. MEC architecture.
Figure 13. MEC architecture.
Preprints 149800 g013
Figure 14. Hardware security threats and countermeasures [204,205].
Figure 14. Hardware security threats and countermeasures [204,205].
Preprints 149800 g014
Figure 15. Uniqueness of Challenge & Response Pair (CRP) [208].
Figure 15. Uniqueness of Challenge & Response Pair (CRP) [208].
Preprints 149800 g015
Figure 16. Classification of PUFs.
Figure 16. Classification of PUFs.
Preprints 149800 g016
Figure 17. Structure diagram of n-stage APUF.
Figure 17. Structure diagram of n-stage APUF.
Preprints 149800 g017
Figure 18. Layered defense model.
Figure 18. Layered defense model.
Preprints 149800 g018
Figure 19. Edge-ready AI toolkits for Intel FPGAs [261].
Figure 19. Edge-ready AI toolkits for Intel FPGAs [261].
Preprints 149800 g019
Figure 20. Xilinx V i t i s T M AI Integrated Development Environment.
Figure 20. Xilinx V i t i s T M AI Integrated Development Environment.
Preprints 149800 g020
Table 1. Existing surveys on EC security.
Table 1. Existing surveys on EC security.
Reference Scope Focus Limitations
[7,10,59,62,63,64,65,66] Review of Opportunities and Challenges in EC Conversations on EC-assisted IoT architectures, data security and privacy-related challenges alongside insights into potential future research directions. Implementation of AI/ ML-assisted cryptography algorithms and protocols is crucial for ensuring reliable access and control over network, storage, and computation across numerous distributed edge nodes. Limited resources at edge devices act as a barrier in terms of scalability, and flexibility issues. Also, cryptography protocols have difficulty protecting endless data streams or as the data arrives [67].
[17,68,69,70] Network security architecture Secure access service edge (SASE) network architecture integrated with Virtual Private Network (VPN) and software-defined wide area network (SD-WAN) characteristics ensures secured web gateways, firewalls, and zero-trust network access. Converging network access and security into a single network architectural model may be a challenge.
[18,49,58,71,72,73] ML and deep learning (DL) models in the context of Edge security. Discussion on centralized, decentralized, and hybrid architectures implementing AI at the edge as well as technologies like federated learning, model compression, gradient compression, DNN splitting, and gossip-based training. Maintaining and updating the ML models over time and training on the cloud.
[74,75,76,77,78] Intrusion detection system. Host-based Intrusion Detection Systems (HIDS) monitor individual devices, while Network-based Intrusion Detection Systems (NIDS) analyze network traffic for potential threats. The limited computational and storage capabilities of edge nodes limit the processing or storage of large-scale data.
[79,80,81,82] PUF enabled digital fingerprint PUFs utilize the distinctive physical traits of edge devices to offer robust authentication, secure key management, and tamper resistance while eliminating the need for stored cryptographic keys. Highly sensitive to environmental factors like temperature, voltage, and electromagnetic interference, PUFs exhibit unique challenge-response pairs (CRPs) and are vulnerable to machine learning attacks.
Table 2. Comparison of Cloud and Edge computing.
Table 2. Comparison of Cloud and Edge computing.
Characteristics Cloud computing Edge computing
Deployment Centralized Distributed
Latency High Low
Computational Unlimited Limited
Storage Unlimited Limited
Scalability High Low
Privacy High risk Data stays at source
Security A robust security plan, and proactive monitoring against attacks is required It requires, to a lesser degree, a powerful security plan
Table 3. Mitigating edge network security threats [124].
Table 3. Mitigating edge network security threats [124].
Strategy Description
Edge Node Security Uniform security levels are applied at edge nodes to ensure appropriate safety protocols. Different security levels may allow attackers to break through the nodes with weaker security algorithms.
Full-time Monitoring Warrants nonstop monitoring of edge nodes while offering network clarity to users through a collaborating interface.
Proper Encryption A complicated algorithm or a secure password exchanged exclusively between legitimate senders and recipients, granting access solely to genuine users.
Intrusion Detection System Identifies any abnormality or illegal access and alerts the user in case of dubious activities.
User Behavior Profiling Maintaining a record of users’ behavior and keeping track of activities apart from normal behavior to detect an attacker’s presence.
Cryptographic Techniques Secures significant data using codes that block security attacks through a secret key.
Data Confidentiality Mitigates privacy concerns while restricting unauthorized data transactions, data loss, data tampering, data breaches, and related issues.
Table 6. Comparing the performance of PUFs.
Table 6. Comparing the performance of PUFs.
Article PUF type Stages Uniqueness [mean (std)] Uniformity [mean (std)] Reliability [mean (std)]
[222] Lattice PUF 1000 50.00% (1.58%) 49.98% (1.58%) 1.26% (2.88%)
[224] FLAM-PUF 64/128 49.73% / 49.99% 49.81% / 49.85% 95.59%/96.58%
[225] Strong response-feedback PUF 32/64/128 50.17 (1.41) / 50.00 (0.31) / 49.99 (0.21) 49.54 (3.67)/ 50.05 (2.79)/ 49.93 (1.78) -
[226] DDQ-APUF 64/ 128 47.28%/ 47.65% 50%/ 50% 99.95%/ 99.91%
[234] FOM-CDS PUF 17 47.38%(RO mode)/ 53.79% (TERO mode)/ 50.33% (Full mode) 47.71% (RO mode)/ 56.23% (TERO mode)/ 53.68% (Full mode) 3.1% CRO-PUF/ 9.14% Dual mode/ 7.91% FOM-CDS PUF
[235] CRC-PUF 128 49.9978% 50.0777% -
[237] RC-PUF 32 27.3% (bit delay = 2 us)/ 30.9% (bit delay = 32 us) 50.3% (bit delay = 2 us)/ 50.3% (bit delay = 32 us) 96.2% (bit delay = 2 us)/ 98.5% (bit delay = 32 us)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated