A Comprehensive Review of Edge Computing Approaches for Secure and Efficient Data Processing in IoT Networks

Authors

  • Michael Oladipo Akinsanya

    Wichita State University, Kansas, US
    Author
  • Aminath Bolaji Bello

    Adekunle Ajasin University, Akungba Akoko, Ondo State, Nigeria
    Author
  • Oluwafemi Clement Adeusi

    Staffordshire University, UK
    Author

Keywords:

Edge Computing, IoT Security, Federated Learning, Homomorphic Encryption and Decentralized AI

Abstract

The exponential growth of IoT networks brings the related concerns of data security, privacy, and regulatory compliance to the fore, especially when threats to traditional cloud-based processing models include latency, cyberattacks, and unauthorized access to the data. Edge computing emerged as a decentralized solution that brings data processing closer to IoT devices to reduce single points of failure while enhancing real-time threat detection. In this paper, we examine some of the most important security technologies for edge-based IoT environments, such as Trusted Execution Environments (TEEs) and their use in conjunction with homomorphic encryption and federated learning, analyzing their strengths and weaknesses. It highlights scalability challenges, security vulnerabilities, and regulatory compliance issues within edge computing. Other emerging trends like blockchain-integrated edge AI, post-quantum cryptography, and self-learning cybersecurity models will enable the next generation of secure, privacy-preserving IoT ecosystems. By adopting hybrid security frameworks and adaptive AI-driven security mechanisms, firms can guarantee a robust, scalable, and compliant edge computing solution for IoT network

Author Biographies

  • Michael Oladipo Akinsanya, Wichita State University, Kansas, US


    School of Computing, 

     
  • Aminath Bolaji Bello, Adekunle Ajasin University, Akungba Akoko, Ondo State, Nigeria


    Department of Mathematical Sciences, Faculty of Science, 

  • Oluwafemi Clement Adeusi, Staffordshire University, UK


    Department of Computer Science Network and Security, 

Downloads

Published

2023-09-19

Most read articles by the same author(s)

Similar Articles

1-10 of 170

You may also start an advanced similarity search for this article.