Education, Science, Technology, Innovation and Life
Open Access
Sign In

IoT Security Architecture Design Based on Edge Computing

Download as PDF

DOI: 10.23977/acss.2025.090220 | Downloads: 3 | Views: 241

Author(s)

Yuting Yang 1

Affiliation(s)

1 Foreign Language Teaching Department, Hainan Vocational University of Science and Technology, Haikou, Hainan, 571126, China

Corresponding Author

Yuting Yang

ABSTRACT

This paper proposes an IoT security architecture based on edge computing, designed to address security challenges in heterogeneous device, resource-constrained, and dynamic threat environments. Through systematic analysis of the shortcomings of existing security mechanisms, a layered security system covering the device layer, edge layer, and cloud management layer is constructed. This system integrates distributed identity authentication, trusted execution environments, intelligent threat detection, and lightweight encryption technology to effectively enhance the overall attack resistance and response speed of the system. In terms of data protection, local data processing, hierarchical storage, differential privacy, and anonymization techniques are adopted to ensure the privacy and security of data in transmission, storage, and processing. In accordance with the requirements of compliance regulations, a comprehensive data management strategy is formulated to enhance the legal and security compliance of the system. This architecture realizes multi-dimensional, elastic, and adaptive security protection, providing a strong guarantee for the secure and trusted operation of the Internet of Things, and laying a theoretical foundation for future widespread application and continuous innovation.

KEYWORDS

Edge Computing, IoT Security, Trusted Execution Environment, Threat Detection, Data Privacy

CITE THIS PAPER

Yuting Yang, IoT Security Architecture Design Based on Edge Computing. Advances in Computer, Signals and Systems (2025) Vol. 9: 163-169. DOI: http://dx.doi.org/10.23977/acss.2025.090220.

REFERENCES

[1] Zhang Hongrong, Zhang Feng. Internet of Things Data Architecture Design: Research on Theoretical Framework and Practical Application [J]. Internet of Things Technology, 2025, 15(11):111-114+118.
[2] Liu Min. Research on the Integration of Edge Computing and Industrial Internet of Things [J]. Modern Industrial Economics and Informatization, 2024, 14(05):55-56+87.
[3] Zhang Xinyue. Internet of Things Architecture Design and Optimization for Smart Cities [J]. China Broadband, 2025,21(05):136-138.
[4] Wang Yao. Research on the Security Architecture of the Internet of Things Based on Edge Computing and Blockchain [J] Information Record Materials, 2025, 26(03):187-190.
[5] Qin Xiaofei. Research on Secure Communication and Edge Computing for Space-based Internet of Things [D]. Dalian Maritime University, 2024.
[6] Li Sen. Research on Trusted Authentication of Internet of Things Devices in Edge Computing Environment [D]. East China Jiaotong University, 2024.
[7] Wei Jingli. Research on Intelligent Internet of Things Application Technology Based on Edge Computing [J]. Modern Industrial Economics and Informatization, 2023, 13(10):124-126.
[8] Zhou Qihao. Research on Distributed Security Mechanism and Key Technologies for the Internet of Things [D] Beijing University of Posts and Telecommunications, 2023.

Downloads: 38553
Visits: 697935

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.