Edge Sensor Security: A Structured Literature Review of Perception Layer Attacks

Presenter Type

UNO Graduate Student (Doctoral)

Major/Field of Study

Computer Science

Advisor Information

Robin Gandhi, George Grispos

Location

CEC RM #116

Presentation Type

Oral Presentation

Start Date

22-3-2024 10:30 AM

End Date

22-3-2024 11:45 AM

Abstract

Edge computing has swiftly developed into a crucial part of modern data infrastructure. It plays a fundamental role in enabling intelligent monitoring and control through sensors and actuators. While there is much work in protecting the computation and network layers of edge computing, the body of work on securing the perception layer that directly collects data from the environment is limited. This work outlines the preliminary findings of a systematic literature review (SLR) aimed at identifying the spectrum of security threats faced by sensors in the perception layer and evaluating the proposed countermeasures. Initial findings suggest a complex threat environment, with the perception layer being vulnerable to physical and remote cyber threats. Notably, "Man in the Middle", "Sybil", and "Replay" attacks emerged as prevalent, each accounting for over 8% of the documented threats. This SLR also documents defense mechanisms documented in existing research, pointing towards a multifaceted approach to safeguarding edge computing networks. The outcomes of this review are expected to offer significant contributions to the field by organizing the current understanding of perception layer threats and defenses and informing the future direction for resilient security strategies in various edge computing deployments.

This document is currently not available here.

COinS
 
Mar 22nd, 10:30 AM Mar 22nd, 11:45 AM

Edge Sensor Security: A Structured Literature Review of Perception Layer Attacks

CEC RM #116

Edge computing has swiftly developed into a crucial part of modern data infrastructure. It plays a fundamental role in enabling intelligent monitoring and control through sensors and actuators. While there is much work in protecting the computation and network layers of edge computing, the body of work on securing the perception layer that directly collects data from the environment is limited. This work outlines the preliminary findings of a systematic literature review (SLR) aimed at identifying the spectrum of security threats faced by sensors in the perception layer and evaluating the proposed countermeasures. Initial findings suggest a complex threat environment, with the perception layer being vulnerable to physical and remote cyber threats. Notably, "Man in the Middle", "Sybil", and "Replay" attacks emerged as prevalent, each accounting for over 8% of the documented threats. This SLR also documents defense mechanisms documented in existing research, pointing towards a multifaceted approach to safeguarding edge computing networks. The outcomes of this review are expected to offer significant contributions to the field by organizing the current understanding of perception layer threats and defenses and informing the future direction for resilient security strategies in various edge computing deployments.