Edge Sensor Security: A Structured Literature Review of Perception Layer Attacks
Presenter Type
UNO Graduate Student (Doctoral)
Major/Field of Study
Computer Science
Advisor Information
Robin Gandhi, George Grispos
Location
CEC RM #116
Presentation Type
Oral Presentation
Start Date
22-3-2024 10:30 AM
End Date
22-3-2024 11:45 AM
Abstract
Edge computing has swiftly developed into a crucial part of modern data infrastructure. It plays a fundamental role in enabling intelligent monitoring and control through sensors and actuators. While there is much work in protecting the computation and network layers of edge computing, the body of work on securing the perception layer that directly collects data from the environment is limited. This work outlines the preliminary findings of a systematic literature review (SLR) aimed at identifying the spectrum of security threats faced by sensors in the perception layer and evaluating the proposed countermeasures. Initial findings suggest a complex threat environment, with the perception layer being vulnerable to physical and remote cyber threats. Notably, "Man in the Middle", "Sybil", and "Replay" attacks emerged as prevalent, each accounting for over 8% of the documented threats. This SLR also documents defense mechanisms documented in existing research, pointing towards a multifaceted approach to safeguarding edge computing networks. The outcomes of this review are expected to offer significant contributions to the field by organizing the current understanding of perception layer threats and defenses and informing the future direction for resilient security strategies in various edge computing deployments.
Edge Sensor Security: A Structured Literature Review of Perception Layer Attacks
CEC RM #116
Edge computing has swiftly developed into a crucial part of modern data infrastructure. It plays a fundamental role in enabling intelligent monitoring and control through sensors and actuators. While there is much work in protecting the computation and network layers of edge computing, the body of work on securing the perception layer that directly collects data from the environment is limited. This work outlines the preliminary findings of a systematic literature review (SLR) aimed at identifying the spectrum of security threats faced by sensors in the perception layer and evaluating the proposed countermeasures. Initial findings suggest a complex threat environment, with the perception layer being vulnerable to physical and remote cyber threats. Notably, "Man in the Middle", "Sybil", and "Replay" attacks emerged as prevalent, each accounting for over 8% of the documented threats. This SLR also documents defense mechanisms documented in existing research, pointing towards a multifaceted approach to safeguarding edge computing networks. The outcomes of this review are expected to offer significant contributions to the field by organizing the current understanding of perception layer threats and defenses and informing the future direction for resilient security strategies in various edge computing deployments.