Edge Computing Security with an IoT device

Journal Title: Journal of Emerging Computer Technologies - Year 2021, Vol 1, Issue 1

Abstract

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.

Authors and Affiliations

Beyda Nur Kars

Keywords

Related Articles

Vehicle Detection with HOG and Linear SVM

In this paper, we present a vehicle detection system by employing Histogram of Oriented Gradients (HOG) for feature extraction and linear SVM for classification. We study the influence of the colour space on the performa...

Edge Computing Security with an IoT device

Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this chan...

GoHammer Blockchain Performance Test Tool

Decentralized services are increasingly being developed and their Decentralized applications are increasingly developed but their performance metrics are not tested enough. The total number of transactions that can be su...

A Dynamic Method and Program for Multiple Password Generation and Management

Authentication is a process that users must do first to gain access to the websites/services they receive service from. Today, the most common method used for authentication is still text-based passwords. But, some diffi...

Semantic Web and Hospital Appointment Ontology

Ontologies are a very important element for applications. They are used in many areas such as management information systems, e-commerce applications. Ontologies also play a major role in the new technology called Web 3....

Download PDF file
  • EP ID EP706076
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Beyda Nur Kars (2021). Edge Computing Security with an IoT device. Journal of Emerging Computer Technologies, 1(1), -. https://europub.co.uk/articles/-A-706076