본문 바로가기
  • Home

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats

  • Journal of Internet of Things and Convergence
  • Abbr : JKIOTS
  • 2024, 10(2), pp.77-84
  • Publisher : The Korea Internet of Things Society
  • Research Area : Engineering > Computer Science > Internet Information Processing
  • Received : February 27, 2024
  • Accepted : March 27, 2024
  • Published : April 30, 2024

Jeong Yoon Su 1

1목원대학교

Accredited

ABSTRACT

Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

Citation status

* References for papers published after 2023 are currently being built.