IoT Security Architecture Design Based on Edge Computing
DOI: 10.23977/acss.2025.090220 | Downloads: 3 | Views: 241
Author(s)
Yuting Yang 1
Affiliation(s)
1 Foreign Language Teaching Department, Hainan Vocational University of Science and Technology, Haikou, Hainan, 571126, China
Corresponding Author
Yuting YangABSTRACT
This paper proposes an IoT security architecture based on edge computing, designed to address security challenges in heterogeneous device, resource-constrained, and dynamic threat environments. Through systematic analysis of the shortcomings of existing security mechanisms, a layered security system covering the device layer, edge layer, and cloud management layer is constructed. This system integrates distributed identity authentication, trusted execution environments, intelligent threat detection, and lightweight encryption technology to effectively enhance the overall attack resistance and response speed of the system. In terms of data protection, local data processing, hierarchical storage, differential privacy, and anonymization techniques are adopted to ensure the privacy and security of data in transmission, storage, and processing. In accordance with the requirements of compliance regulations, a comprehensive data management strategy is formulated to enhance the legal and security compliance of the system. This architecture realizes multi-dimensional, elastic, and adaptive security protection, providing a strong guarantee for the secure and trusted operation of the Internet of Things, and laying a theoretical foundation for future widespread application and continuous innovation.
KEYWORDS
Edge Computing, IoT Security, Trusted Execution Environment, Threat Detection, Data PrivacyCITE THIS PAPER
Yuting Yang, IoT Security Architecture Design Based on Edge Computing. Advances in Computer, Signals and Systems (2025) Vol. 9: 163-169. DOI: http://dx.doi.org/10.23977/acss.2025.090220.
REFERENCES
[1] Zhang Hongrong, Zhang Feng. Internet of Things Data Architecture Design: Research on Theoretical Framework and Practical Application [J]. Internet of Things Technology, 2025, 15(11):111-114+118.
[2] Liu Min. Research on the Integration of Edge Computing and Industrial Internet of Things [J]. Modern Industrial Economics and Informatization, 2024, 14(05):55-56+87.
[3] Zhang Xinyue. Internet of Things Architecture Design and Optimization for Smart Cities [J]. China Broadband, 2025,21(05):136-138.
[4] Wang Yao. Research on the Security Architecture of the Internet of Things Based on Edge Computing and Blockchain [J] Information Record Materials, 2025, 26(03):187-190.
[5] Qin Xiaofei. Research on Secure Communication and Edge Computing for Space-based Internet of Things [D]. Dalian Maritime University, 2024.
[6] Li Sen. Research on Trusted Authentication of Internet of Things Devices in Edge Computing Environment [D]. East China Jiaotong University, 2024.
[7] Wei Jingli. Research on Intelligent Internet of Things Application Technology Based on Edge Computing [J]. Modern Industrial Economics and Informatization, 2023, 13(10):124-126.
[8] Zhou Qihao. Research on Distributed Security Mechanism and Key Technologies for the Internet of Things [D] Beijing University of Posts and Telecommunications, 2023.
Downloads: | 38553 |
---|---|
Visits: | 697935 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks