Edge Computing Security: Threats and Countermeasures in Edge Networks

Main Article Content

Daniel Wright
Elena Vasquez

Abstract

Edge computing has emerged as a transformative paradigm, enabling low-latency processing and real-time decision-making by decentralizing computation closer to data sources. However, the distributed nature of edge networks introduces significant security challenges, including data breaches, unauthorized access, and sophisticated cyberattacks targeting resource-constrained edge nodes. This paper provides a comprehensive analysis of security threats in edge computing, categorizing them into device, network, and application-level vulnerabilities. Additionally, we explore state-of-the-art countermeasures, including lightweight encryption schemes, secure authentication protocols, and AI-driven anomaly detection. By highlighting recent advancements and open research challenges, this study aims to guide the development of robust security frameworks for future edge networks.

Article Details

How to Cite
Wright, D., & Vasquez, E. (2025). Edge Computing Security: Threats and Countermeasures in Edge Networks. International Journal on Advanced Computer Theory and Engineering, 12(2), 1–6. Retrieved from https://journals.mriindia.com/index.php/ijacte/article/view/110
Section
Articles

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.