A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Security of Distributed Intelligence in Edge Computing: Threats and Countermeasures
[chapter]
2020
The Cloud-to-Thing Continuum
Rapid growth in the amount of data produced by IoT sensors and devices has led to the advent of edge computing wherein the data is processed at a point at or near to its origin. This facilitates lower latency, as well as data security and privacy by keeping the data localized to the edge node. However, due to the issues of resource-constrained hardware and software heterogeneities, most edge computing systems are prone to a large variety of attacks. Furthermore, the recent trend of
doi:10.1007/978-3-030-41110-7_6
fatcat:dikjnfcbhre3rnaumiwx2gxptm