Profile
International Journal of Computer & Software Engineering Volume 4 (2019), Article ID 4:IJCSE-148, 7 pages
https://doi.org/10.15344/2456-4451/2019/148
Review Article
The Review of IoT Security Framework Based on Mobile Edge Computing

Fan Yongkai1,2, Zhao Guanqun1,2, Sun Xiaofeng1,2* and Lin Xiaodong1,2

1Beijing Key Lab of Petroleum Data Mining, China University of Petroleum, Beijing, China
2Departmentt of Computer Science and Technology, China University of Petroleum, Beijing, China
Sun Xiaofeng, Beijing Key Lab of Petroleum Data Mining, China University of Petroleum, 18 Fuxue Rd, Changping Qu, Beijing Shi, China; E-mail: 2017011316@student.cup.edu.cn
10 June 2019; 16 July 2019; 18 July 2019
Yongkai F, Guanqun Z, Xiaofeng S, Xiaodong L (2019) The Review of IoT Security Framework Based on Mobile Edge Computing. Int J Comput Softw Eng 4: 148. doi: https://doi.org/10.15344/2456-4451/2019/148
This work was partially supported by CERNET Innovation Project (No. NGII20180406), by Beijing Higher Education Young Elite Teacher Project (No. YETP0683), by Beijing Higher Education Teacher Project (No. 00001149).

Abstract

At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.