{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:33:36Z","timestamp":1775838816371,"version":"3.50.1"},"reference-count":288,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"A\u2019Sharqiyah University","award":["IRG-16"],"award-info":[{"award-number":["IRG-16"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, response time, and bandwidth utilization. However, the distributed architecture of EC makes it vulnerable to data security breaches and diverse attack vectors. The edge paradigm has limited availability of resources like memory and battery power. Also, the heterogeneous nature of the hardware, diverse communication protocols, and difficulty in timely updating security patches exist. A significant number of researchers have presented countermeasures for the detection and mitigation of data security threats in an EC paradigm. However, an approach that differs from traditional data security and privacy-preserving mechanisms already used in cloud computing is required. Artificial Intelligence (AI) greatly improves EC security through advanced threat detection, automated responses, and optimized resource management. When combined with Physical Unclonable Functions (PUFs), AI further strengthens data security by leveraging PUFs\u2019 unique and unclonable attributes alongside AI\u2019s adaptive and efficient management features. This paper investigates various edge security strategies and cutting-edge solutions. It presents a comparison between existing strategies, highlighting their benefits and limitations. Additionally, the paper offers a detailed discussion of EC security threats, including their characteristics and the classification of different attack types. The paper also provides an overview of the security and privacy needs of the EC, detailing the technological methods employed to address threats. Its goal is to assist future researchers in pinpointing potential research opportunities.<\/jats:p>","DOI":"10.3390\/fi17040175","type":"journal-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T06:12:06Z","timestamp":1744783926000},"page":"175","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5506-6427","authenticated-orcid":false,"given":"Abdul Manan","family":"Sheikh","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, College of Engineering, A\u2019Sharqiyah University, Ibra 400, Oman"},{"name":"Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0808-2840","authenticated-orcid":false,"given":"Md. Rafiqul","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2263-0850","authenticated-orcid":false,"given":"Mohamed Hadi","family":"Habaebi","sequence":"additional","affiliation":[{"name":"Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1584-2636","authenticated-orcid":false,"given":"Suriza Ahmad","family":"Zabidi","sequence":"additional","affiliation":[{"name":"Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia"}]},{"given":"Athaur Rahman","family":"Bin Najeeb","sequence":"additional","affiliation":[{"name":"Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9312-4704","authenticated-orcid":false,"given":"Adnan","family":"Kabbani","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, College of Engineering, A\u2019Sharqiyah University, Ibra 400, Oman"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"key":"ref_1","unstructured":"IMD (2024, September 17). What Is the Internet of Things (IoT) & Why Is It Important?. Available online: https:\/\/www.imd.org\/blog\/digital-transformation\/internet-of-things\/."},{"key":"ref_2","unstructured":"Vailshery, L.S. (2024, September 17). Number of IoT Connections Worldwide 2022\u20132033. Available online: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"38833","DOI":"10.1109\/ACCESS.2021.3061697","article-title":"Green Internet of Things (GIoT): Applications, Practices, Awareness, and Challenges","volume":"9","author":"Albreem","year":"2021","journal-title":"IEEE Access"},{"key":"ref_4","unstructured":"sptel (2024, September 15). Future Development of IoT in Singapore\u20142024 & Beyond. Available online: https:\/\/sptel.com\/future-development-of-iot\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.69955\/ajoeee.2021.v1i2.69","article-title":"Securing the IoT Edge Devices Using Advanced Digital Technologies","volume":"4","author":"Sheikh","year":"2024","journal-title":"Asian J. Electr. Electron. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A survey on the edge computing for the Internet of Things","volume":"6","author":"Yu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","article-title":"A survey on security and privacy issues in edge-computing-assisted internet of things","volume":"8","author":"Alwarafy","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"76541","DOI":"10.1109\/ACCESS.2020.2989456","article-title":"Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities","volume":"8","author":"Yahuza","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MC.2016.145","article-title":"The Promise of Edge Computing","volume":"49","author":"Shi","year":"2016","journal-title":"Computer"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","article-title":"Security and privacy in fog computing: Challenges","volume":"5","author":"Mukherjee","year":"2017","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MCOM.2018.1701231","article-title":"Edge Computing in IoT-Based Manufacturing","volume":"56","author":"Chen","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1109\/JIOT.2018.2805263","article-title":"Edge computing for the Internet of Things: A case study","volume":"5","author":"Premsankar","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1186\/s13677-020-00202-w","article-title":"An active and verifiable trust evaluation approach for edge computing","volume":"9","author":"Mo","year":"2020","journal-title":"J. Cloud Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4260","DOI":"10.1109\/JIOT.2019.2963371","article-title":"Learning-based context-aware resource allocation for edge-computing-empowered industrial IoT","volume":"7","author":"Liao","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","article-title":"Data security and privacy-preserving in edge computing paradigm: Survey and open issues","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Rupanetti, D., and Kaabouch, N. (2024). Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities. Appl. Sci., 14.","DOI":"10.3390\/app14167104"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","article-title":"Edge computing security: State of the art and challenges","volume":"107","author":"Xiao","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref_19","unstructured":"Begg, R. (2022, September 17). Digital Supply Chain: Cybersecurity Report Flags Clear and Present Danger. Available online: https:\/\/www.machinedesign.com\/automation-iiot\/article\/21236851\/netscout-digital-supply-chain-cybersecurity-report-flags-clear-and-present-danger\/."},{"key":"ref_20","unstructured":"Jovanovic, B. (2022, September 17). Internet of Things statistics for 2022\u2014Taking Things Apart. Available online: https:\/\/dataprot.net\/statistics\/iot-statistics\/#:~:text=Malware%20attacks%20are%20now%20affecting,a%20third%20of%20infected%20devices."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"100293","DOI":"10.1016\/j.array.2023.100293","article-title":"Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions","volume":"19","author":"Yao","year":"2023","journal-title":"Array"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1632","DOI":"10.1109\/JPROC.2019.2918749","article-title":"Privacy techniques for edge computing systems","volume":"107","author":"Rao","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TBDATA.2024.3366071","article-title":"Edge-DPSDG: An Edge-based Differential Privacy Protection Model for Smart Healthcare","volume":"11","author":"Lyu","year":"2024","journal-title":"IEEE Trans. Big Data"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TII.2021.3131175","article-title":"Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression","volume":"19","author":"Jiang","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","first-page":"807","article-title":"An Efficient Lightweight Authentication and Access Control for IoT Edge Devices","volume":"14","author":"Zerraza","year":"2024","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"21493","DOI":"10.1109\/JIOT.2022.3184293","article-title":"An authentication protocol for next generation of constrained Iot systems","volume":"9","author":"Rostampour","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/JIOT.2021.3088641","article-title":"A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things","volume":"9","author":"Ding","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"14237","DOI":"10.1109\/JIOT.2020.3023588","article-title":"A secure data aggregation strategy in edge computing and blockchain-empowered internet of things","volume":"9","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/TII.2019.2936278","article-title":"Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure","volume":"16","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"14752","DOI":"10.1109\/JIOT.2021.3058125","article-title":"Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the IIoE","volume":"9","author":"Bai","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5922","DOI":"10.1109\/TSP.2019.2949504","article-title":"Secure mobile edge computing in IoT via collaborative online learning","volume":"67","author":"Li","year":"2019","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MNET.2018.1700364","article-title":"Enabling collaborative edge computing for software defined vehicular networks","volume":"32","author":"Wang","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TCSS.2021.3092746","article-title":"A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bourechak, A., Zedadra, O., Kouahla, M.N., Guerrieri, A., Seridi, H., and Fortino, G. (2023). At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives. Sensors, 23.","DOI":"10.3390\/s23031639"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","article-title":"A survey of recent advances in edge-computing-powered artificial intelligence of things","volume":"8","author":"Chang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"7457","DOI":"10.1109\/JIOT.2020.2984887","article-title":"Edge intelligence: The confluence of edge computing and artificial intelligence","volume":"7","author":"Deng","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_37","first-page":"25","article-title":"Implementation of image processing algorithm on FPGA","volume":"2","author":"Manan","year":"2006","journal-title":"Akgec J. Technol."},{"key":"ref_38","unstructured":"Biookaghazadeh, S., Zhao, M., and Ren, F. (2018, January 10). Are {FPGAs} Suitable for Edge Computing?. Proceedings of the USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), Boston, MA, USA."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sipola, T., Alatalo, J., Kokkonen, T., and Rantonen, M. (2022, January 27\u201329). Artificial intelligence in the IoT era: A review of edge AI hardware and software. Proceedings of the 2022 31st Conference of Open Innovations Association (FRUCT), Helsinki, Finland.","DOI":"10.23919\/FRUCT54823.2022.9770931"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Jiang, S., He, D., Yang, C., Xu, C., Luo, G., Chen, Y., Liu, Y., and Jiang, J. (2018, January 16\u201319). Accelerating mobile applications at the network edge with software-programmable FPGAs. Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8485850"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"23673","DOI":"10.1109\/JIOT.2024.3391661","article-title":"A Lightweight Hardware-Assisted Security Method for eFPGA Edge Devices","volume":"11","author":"Zhao","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ngo, D.M., Temko, A., Murphy, C.C., and Popovici, E. (September, January 30). FPGA hardware acceleration framework for anomaly-based intrusion detection system in IoT. Proceedings of the 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), Dresden, Germany.","DOI":"10.1109\/FPL53798.2021.00020"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"012003","DOI":"10.1088\/1742-6596\/1619\/1\/012003","article-title":"A Highly Reliable Strong Physical Unclonable Function Design Based on FPGA","volume":"1619","author":"Zhang","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Xu, T., and Potkonjak, M. (2014, January 2\u20134). Robust and flexible FPGA-based digital PUF. Proceedings of the 2014 24th International Conference on Field Programmable Logic and Applications (FPL), Munich, Germany.","DOI":"10.1109\/FPL.2014.6927449"},{"key":"ref_45","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., and Tuyls, P. (2007, January 10\u201313). FPGA intrinsic PUFs and their use for IP protection. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Kang, H., Hori, Y., and Satoh, A. (2012, January 2\u20135). Performance evaluation of the first commercial PUF-embedded RFID. Proceedings of the The 1st IEEE Global Conference on Consumer Electronics, Tokyo, Japan.","DOI":"10.1109\/GCCE.2012.6379926"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Suh, G.E., and Devadas, S. (2007, January 4\u20138). Physical unclonable functions for device authentication and secret key generation. Proceedings of the 2007 44th ACM\/IEEE Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_48","unstructured":"Alkabani, Y., Koushanfar, F., and Potkonjak, M. (2007, January 4\u20138). Remote activation of ICs for piracy prevention and digital right management. Proceedings of the 2007 IEEE\/ACM International Conference on Computer-Aided Design, San Jose, CA, USA."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4946","DOI":"10.1109\/JIOT.2019.2897619","article-title":"A survey on secure data analytics in edge computing","volume":"6","author":"Liu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"8872586","DOI":"10.1155\/2020\/8872586","article-title":"Artificial intelligence for securing IoT services in edge computing: A survey","volume":"2020","author":"Xu","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MCE.2017.2685019","article-title":"Security and privacy challenges in the internet of things [security and privacy matters]","volume":"6","author":"Lee","year":"2017","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.vlsi.2021.06.001","article-title":"FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures","volume":"81","author":"Anandakumar","year":"2021","journal-title":"Integration"},{"key":"ref_53","unstructured":"Lounis, K., and Zulkernine, M. (2025, February 14). More Lessons: Analysis of PUF-Based Authentication Protocols for IoT. Cryptology ePrint Archive, Paper 2021\/1509. Available online: https:\/\/eprint.iacr.org\/2021\/1509."},{"key":"ref_54","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M., Tehranipoor, M., and Wang, C. (2011). FPGA-oriented Security. Introduction to Hardware Security and Trust, Springer."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Merenda, M., Porcaro, C., and Iero, D. (2020). Edge machine learning for ai-enabled iot devices: A review. Sensors, 20.","DOI":"10.3390\/s20092533"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Ansari, M.S., Alsamhi, S.H., Qiao, Y., Ye, Y., and Lee, B. (2020). Security of distributed intelligence in edge computing: Threats and countermeasures. The Cloud-to-Thing Continuum, Palgrave Macmillan.","DOI":"10.1007\/978-3-030-41110-7_6"},{"key":"ref_57","first-page":"327","article-title":"The Internet of Medical Things (IoMT): Opportunities and challenges","volume":"31","author":"Sheikh","year":"2024","journal-title":"Wirel. Netw."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","article-title":"Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing","volume":"32","author":"Liu","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.future.2020.07.009","article-title":"DecChain: A decentralized security approach in Edge Computing based on Blockchain","volume":"113","author":"Bonnah","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1109\/COMST.2019.2894727","article-title":"Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges","volume":"21","author":"Yang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Luo, C., Xu, L., Li, D., and Wu, W. (2020). Edge computing integrated with blockchain technologies. Complexity and Approximation, Springer.","DOI":"10.1007\/978-3-030-41672-0_17"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Mendki, P. (2020, January 12\u201314). Blockchain enabled iot edge computing: Addressing privacy, security and other challenges. Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, Hilo, HI, USA.","DOI":"10.1145\/3390566.3391689"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Kotevska, O., Johnson, J., and Kusne, A.G. (2022, January 20\u201324). Analyzing Data Privacy for Edge Systems. Proceedings of the 2022 IEEE International Conference on Smart Computing (SMARTCOMP), Espoo, Finland.","DOI":"10.1109\/SMARTCOMP55677.2022.00058"},{"key":"ref_64","unstructured":"Paillet, D. (2021). An Overview of Cybersecurity Best Practices for Edge Computing, Schneider Electric. Technical Report."},{"key":"ref_65","unstructured":"Johannes Beekman (2024, September 17). How to Deal with Edge Computing Security Concerns. Available online: https:\/\/iotmktg.com\/how-to-deal-edge-computing-security-concerns\/."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Van der Walt, S., and Venter, H. (2022, January 17\u201318). Research gaps and opportunities for secure access service edge. Proceedings of the International Conference on Cyber Warfare and Security, Albany, NY, USA.","DOI":"10.34190\/iccws.17.1.75"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JIOT.2021.3098051","article-title":"Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey","volume":"9","author":"Singh","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Waguie, F.T., and Al-Turjman, F. (2022, January 2\u20134). Artificial intelligence for edge computing security: A survey. Proceedings of the 2022 International Conference on Artificial Intelligence in Everything (AIE), Lefkosa, Cyprus.","DOI":"10.1109\/AIE57029.2022.00091"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1109\/JPROC.2019.2918951","article-title":"Edge intelligence: Paving the last mile of artificial intelligence with edge computing","volume":"107","author":"Zhou","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MCE.2018.2851723","article-title":"Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices","volume":"7","author":"Lin","year":"2018","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_71","unstructured":"Spadaccino, P., and Cuomo, F. (2020). Intrusion Detection Systems for IoT: Opportunities and challenges offered by Edge Computing and Machine Learning. arXiv."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"3719","DOI":"10.1007\/s40747-021-00498-4","article-title":"An edge based hybrid intrusion detection framework for mobile edge computing","volume":"8","author":"Singh","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Alsubhi, K. (2024). A Secured Intrusion Detection System for Mobile Edge Computing. Appl. Sci., 14.","DOI":"10.2139\/ssrn.4699806"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Gyamfi, E., and Jurcut, A. (2022). Intrusion detection in internet of things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors, 22.","DOI":"10.3390\/s22103744"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"124785","DOI":"10.1109\/ACCESS.2019.2925106","article-title":"PUF-based anonymous authentication scheme for hardware devices and IPs in edge computing environment","volume":"7","author":"Long","year":"2019","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Mohanty, S.P., Kougianos, E., and Puthal, D. (2022, January 18\u201320). PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing. Proceedings of the 2022 IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India.","DOI":"10.1109\/iSES54909.2022.00094"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TVLSI.2023.3277517","article-title":"Puf-cim: Sram-based compute-in-memory with zero bit-error-rate physical unclonable function for lightweight secure edge computing","volume":"31","author":"Chen","year":"2023","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s11390-016-1616-8","article-title":"Techniques for design and implementation of an FPGA-specific physical unclonable function","volume":"31","author":"Zhang","year":"2016","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"56591","DOI":"10.1109\/ACCESS.2022.3174865","article-title":"Blockchain-enabled federated learning for UAV edge computing network: Issues and solutions","volume":"10","author":"Zhu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"103884","DOI":"10.1016\/j.jnca.2024.103884","article-title":"Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications","volume":"226","author":"Nguyen","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Song, S., Choi, B.Y., and Kim, D. (2016, January 15\u201318). Selective encryption and component-oriented deduplication for mobile cloud data computing. Proceedings of the 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA.","DOI":"10.1109\/ICCNC.2016.7440636"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"101213","DOI":"10.1109\/ACCESS.2019.2927538","article-title":"Edge computing and networking: A survey on infrastructures and applications","volume":"7","author":"Zhao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TCSS.2021.3056540","article-title":"A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing","volume":"9","author":"Cheng","year":"2022","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Zeyu, H., Geming, X., Zhaohang, W., and Sen, Y. (2020, January 12\u201314). Survey on Edge Computing Security. Proceedings of the 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Fuzhou, China.","DOI":"10.1109\/ICBAIE49996.2020.00027"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCC.2017.9","article-title":"Secure data sharing and searching at the edge of cloud-assisted internet of things","volume":"4","author":"Mollah","year":"2017","journal-title":"IEEE Cloud Comput."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"205340","DOI":"10.1109\/ACCESS.2020.3037108","article-title":"Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities","volume":"8","author":"Bhat","year":"2020","journal-title":"IEEE Access"},{"key":"ref_87","unstructured":"Microsoft (2022, October 18). What Is Edge Computing?. Available online: https:\/\/azure.microsoft.com\/en-us\/resources\/cloud-computing-dictionary\/what-is-edge-computing\/."},{"key":"ref_88","unstructured":"Mohanan, R. (2022, October 18). What Is Edge Computing? Components, Examples, and Best Practices. Available online: https:\/\/www.spiceworks.com\/tech\/edge-computing\/articles\/what-is-edge-computing\/."},{"key":"ref_89","unstructured":"Hemminger, S. (2005, January 18\u201323). Network emulation with NetEm. Proceedings of the Linux conf au, Canberra, ACT, Australia."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"4844","DOI":"10.1109\/JIOT.2018.2872133","article-title":"Multimodel framework for indoor localization under mobile edge computing environment","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","article-title":"Edge computing: A survey","volume":"97","author":"Khan","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"7476201","DOI":"10.1155\/2018\/7476201","article-title":"A taxonomy for management and optimization of multiple resources in edge computing","volume":"2018","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11276-022-03133-3","article-title":"Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: Current practices, challenges and future prospective","volume":"29","author":"Albreem","year":"2023","journal-title":"Wirel. Netw."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., and Nikolopoulos, D.S. (2016, January 18\u201320). Challenges and opportunities in edge computing. Proceedings of the 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA.","DOI":"10.1109\/SmartCloud.2016.18"},{"key":"ref_95","unstructured":"Sunku, R. (2022, November 12). Challenges in Edge Computing. Available online: https:\/\/sunkur.medium.com\/challenges-in-edge-computing-ec9237b5ab77."},{"key":"ref_96","first-page":"174","article-title":"Edge-Computing-Driven Internet of Things: A Survey","volume":"55","author":"Kong","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, D., Edinger, J., VanSyckel, S., Paluska, J.M., and Becker, C. (2016, January 27\u201330). Tasklets: Overcoming heterogeneity in distributed computing systems. Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Nara, Japan.","DOI":"10.1109\/ICDCSW.2016.22"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s00607-020-00896-5","article-title":"Edge computing: Current trends, research challenges and future directions","volume":"103","author":"Carvalho","year":"2021","journal-title":"Computing"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1550147719837859","DOI":"10.1177\/1550147719837859","article-title":"Joint communication and computing resource allocation in vehicular edge computing","volume":"15","author":"Sun","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"73","DOI":"10.23919\/JCC.2022.08.006","article-title":"Joint computing and communication resource allocation for edge computing towards Huge LEO networks","volume":"19","author":"Jia","year":"2022","journal-title":"China Commun."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/MNET.2019.1800309","article-title":"Mobile edge computing-enabled internet of vehicles: Toward energy-efficient scheduling","volume":"33","author":"Ning","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/COMST.2020.2970550","article-title":"Convergence of edge computing and deep learning: A comprehensive survey","volume":"22","author":"Wang","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-022-00365-8","article-title":"Task partitioning and offloading in IoT cloud-edge collaborative computing framework: A survey","volume":"11","author":"Chen","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"108177","DOI":"10.1016\/j.comnet.2021.108177","article-title":"Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions","volume":"195","author":"Saeik","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Feng, M., Krunz, M., and Zhang, W. (2021, January 10\u201313). Task partitioning and user association for latency minimization in mobile edge computing networks. Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada.","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484605"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Ometov, A., Molua, O.L., Komarov, M., and Nurmi, J. (2022). A survey of security in cloud, edge, and fog computing. Sensors, 22.","DOI":"10.3390\/s22030927"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","article-title":"A survey of edge computing-based designs for IoT security","volume":"6","author":"Sha","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4236\/jcc.2024.122003","article-title":"Security Implications of Edge Computing in Cloud Networks","volume":"12","author":"Ahmadi","year":"2024","journal-title":"J. Comput. Commun."},{"key":"ref_109","unstructured":"Accenture (2024, September 15). Edge Computing. Available online: https:\/\/www.accenture.com\/bg-en\/insights\/cloud\/edge-computing-index."},{"key":"ref_110","unstructured":"Abhishek, A., Adeniyi-Jones, C., Van Hensbergen, E., and Balmakhtar, M. (2020, January 25\u201326). Accounting and resource scheduling at the edge. Proceedings of the HotEdge\u201920, Online. Available online: https:\/\/www.usenix.org\/system\/files\/hotedge20_poster_abhishek.pdf."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1700120","article-title":"Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?","volume":"55","author":"Ahmed","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_112","unstructured":"(2023, February 08). Umme Sutarwala, Edge Computing: Four Cybersecurity Challenges in 2022. 7 March 2022. Available online: https:\/\/itsecuritywire.com\/featured\/edge-computing-four-cybersecurity-challenges-in-2022\/."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Wu, W., Zhang, Q., and Wang, H.J. (2019, January 20\u201322). Edge computing security protection from the perspective of classified protection of cybersecurity. Proceedings of the 2019 6th International Conference on Information Science and Control Engineering (ICISCE), Shanghai, China.","DOI":"10.1109\/ICISCE48695.2019.00062"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Mall, A., Singh, P., Thute, A., Khapre, S.P., and Shankar, A. (2021, January 4\u20135). Security issues of edge computing in IoT. Proceedings of the International Conference on Machine Intelligence and Data Science Applications: MIDAS 2020, Dehradun, India.","DOI":"10.1007\/978-981-33-4087-9_47"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","article-title":"Survey on multi-access edge computing security and privacy","volume":"23","author":"Ranaweera","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"103322","DOI":"10.1016\/j.adhoc.2023.103322","article-title":"Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions","volume":"152","author":"Uddin","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"332","DOI":"10.3390\/iot3030019","article-title":"A Survey of Security Architectures for Edge Computing-Based IoT","volume":"3","author":"Fazeldehkordi","year":"2022","journal-title":"IoT"},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCOM.2018.1700906","article-title":"The Role of Edge Computing in Internet of Things","volume":"56","author":"Hassan","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Alwakeel, A.M. (2021). An overview of fog computing and edge computing security and privacy issues. Sensors, 21.","DOI":"10.3390\/s21248226"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/3383641.3383643","article-title":"Edge computing societal privacy and security issues","volume":"48","author":"Guynes","year":"2020","journal-title":"ACM SIGCAS Comput. Soc."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.001.2000297","article-title":"Intelligent edge computing: Security and privacy challenges","volume":"58","author":"Mukherjee","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Zhu, W., Zhou, C., and Jiang, L. (2024). A Trusted Internet of Things Access Scheme for Cloud Edge Collaboration. Electronics, 13.","DOI":"10.3390\/electronics13061026"},{"key":"ref_123","unstructured":"(2023, January 14). Brett Daniel Is Edge Computing Secure? 9 December 2020. Available online: https:\/\/www.trentonsystems.com\/blog\/is-edge-computing-secure."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Xia, Q., Tao, Z., and Li, Q. (2021). Privacy issues in edge computing. Fog\/Edge Computing For Security, Privacy, and Applications, Springer.","DOI":"10.1007\/978-3-030-57328-7_6"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Adil, M., Almaiah, M.A., Omar Alsayed, A., and Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors, 20.","DOI":"10.3390\/s20082311"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"158126","DOI":"10.1109\/ACCESS.2019.2948912","article-title":"Machine learning for security and the internet of things: The good, the bad, and the ugly","volume":"7","author":"Liang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Sheikh, A.M., Islam, M.R., Habaebi, M.H., Zabidi, S.A., Najeeb, A.R.B., and Basahel, A. (2023, January 15\u201316). Machine Learning (ML) assisted Edge security framework on FPGAs. Proceedings of the 2023 9th International Conference on Computer and Communication Engineering (ICCCE), Kualalumpur, Malaysia.","DOI":"10.1109\/ICCCE58854.2023.10246095"},{"key":"ref_128","unstructured":"Blech, R. (2023, June 19). Data Encryption for the Edge. 6 October 2021. Available online: https:\/\/www.xsoccorp.com\/post\/data-encryption-for-the-edge."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"5889","DOI":"10.1007\/s11042-015-2595-4","article-title":"Secure deduplication for multimedia data with user revocation in cloud storage","volume":"76","author":"Kwon","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Neto, E.C.P., Dadkhah, S., and Ghorbani, A.A. (2022, January 10\u201312). Sustainable and Secure Optimization of Load Distribution in Edge Computing. Proceedings of the 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Marietta, GA, USA.","DOI":"10.1109\/HONET56683.2022.10019191"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"4196","DOI":"10.3934\/mbe.2022194","article-title":"Zero trust in edge computing environment: A blockchain based practical scheme","volume":"19","author":"Li","year":"2022","journal-title":"Math. Biosci. Eng."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/JIOT.2020.3025916","article-title":"Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"9233267","DOI":"10.1155\/2022\/9233267","article-title":"Integration of edge computing and blockchain for provision of data fusion and secure big data analysis for Internet of Things","volume":"2022","author":"Dong","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/TCC.2022.3150766","article-title":"Pricing and budget allocation for IoT blockchain with edge computing","volume":"11","author":"Ding","year":"2022","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"6143","DOI":"10.1109\/JIOT.2020.2977196","article-title":"Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach","volume":"7","author":"Medhane","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1186\/s13677-023-00466-y","article-title":"Ensuring security in edge computing through effective blockchain node detection","volume":"12","author":"Wang","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","article-title":"BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing","volume":"16","author":"Xu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","article-title":"Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment","volume":"16","author":"Jangirala","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1186\/s13677-023-00452-4","article-title":"Blockchain-based collaborative edge computing: Efficiency, incentive and trust","volume":"12","author":"Gao","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Mandarino, V., Pappalardo, G., and Tramontana, E. (2024). A Blockchain-Based Electronic Health Record (EHR) System for Edge Computing Enhancing Security and Cost Efficiency. Computers, 13.","DOI":"10.3390\/computers13060132"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","article-title":"When mobile blockchain meets edge computing","volume":"56","author":"Xiong","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"102597","DOI":"10.1016\/j.mex.2024.102597","article-title":"A secure edge computing model using machine learning and IDS to detect and isolate intruders","volume":"12","author":"Mahadevappa","year":"2024","journal-title":"MethodsX"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MIC.2024.3383758","article-title":"Revisiting Edge AI: Opportunities and Challenges","volume":"28","author":"Meuser","year":"2024","journal-title":"IEEE Internet Comput."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3486674","article-title":"Edge Intelligence: Concepts, Architectures, Applications, and Future Directions","volume":"21","author":"Mendez","year":"2022","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"22008","DOI":"10.1109\/JIOT.2023.3304318","article-title":"The security and privacy of mobile edge computing: An artificial intelligence perspective","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"1778","DOI":"10.1109\/JPROC.2021.3119950","article-title":"Edge intelligence: Empowering intelligence to the edge of network","volume":"109","author":"Xu","year":"2021","journal-title":"Proc. IEEE"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Raimundo, R., and Ros\u00e1rio, A. (2021). The impact of artificial intelligence on data system security: A literature review. Sensors, 21.","DOI":"10.3390\/s21217029"},{"key":"ref_148","unstructured":"Montini, H. (2024, October 08). Artificial Intelligence in Cybersecurity: How to Use the Technology. Available online: https:\/\/www.provendata.com\/blog\/ai-in-cybersecurity\/."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Alowais, S.A., Alghamdi, S.S., Alsuhebany, N., Alqahtani, T., Alshaya, A.I., Almohareb, S.N., Aldairem, A., Alrashed, M., Bin Saleh, K., and Badreldin, H.A. (2023). Revolutionizing healthcare: The role of artificial intelligence in clinical practice. BMC Med. Educ., 23.","DOI":"10.1186\/s12909-023-04698-z"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"58322","DOI":"10.1109\/ACCESS.2020.2982411","article-title":"Deep learning for edge computing applications: A state-of-the-art survey","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/TAI.2021.3133819","article-title":"Decentralized deep learning for multi-access edge computing: A survey on communication efficiency and trustworthiness","volume":"3","author":"Sun","year":"2021","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"153826","DOI":"10.1109\/ACCESS.2020.3018170","article-title":"Research on artificial intelligence enhancing internet of things security: A survey","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Kulin, M., Kazaz, T., De Poorter, E., and Moerman, I. (2021). A Survey on Machine Learning-Based Performance Improvement of Wireless Networks: PHY, MAC and Network Layer. Electronics, 10.","DOI":"10.3390\/electronics10030318"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3555802","article-title":"Edge Computing with Artificial Intelligence: A Machine Learning Perspective","volume":"55","author":"Hua","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MAES.2020.3043072","article-title":"Artificial intelligence and data fusion at the edge","volume":"36","author":"Munir","year":"2021","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCE.2021.3099634","article-title":"A trusted hybrid learning approach to secure edge computing","volume":"11","author":"Sedjelmaci","year":"2021","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., and Devadas, S. (2002, January 18\u201322). Silicon physical random functions. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC USA.","DOI":"10.1145\/586131.586132"},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"107593","DOI":"10.1016\/j.comnet.2020.107593","article-title":"A survey on physical unclonable function (PUF)-based security solutions for Internet of Things","volume":"183","author":"Shamsoshoara","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_159","unstructured":"Murphy, D. (2024, January 24). The Role of Machine Learning in Data Security. Available online: https:\/\/www.lepide.com\/blog\/the-role-of-machine-learning-in-data-security\/."},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3624010","article-title":"A survey of privacy attacks in machine learning","volume":"56","author":"Rigaki","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Shen, T., Ding, L., Sun, J., Jing, C., Guo, F., and Wu, C. (2023, January 6\u20138). Edge Computing for IoT Security: Integrating Machine Learning with Key Agreement. Proceedings of the 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China.","DOI":"10.1109\/ICCECE58074.2023.10135211"},{"key":"ref_162","doi-asserted-by":"crossref","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","article-title":"Machine learning for anomaly detection: A systematic review","volume":"9","author":"Nassif","year":"2021","journal-title":"IEEE Access"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3469029","article-title":"Machine learning at the network edge: A survey","volume":"54","author":"Murshed","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_164","doi-asserted-by":"crossref","unstructured":"Brecko, A., Kajati, E., Koziorek, J., and Zolotova, I. (2022). Federated learning for edge computing: A survey. Appl. Sci., 12.","DOI":"10.3390\/app12189124"},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Abreha, H.G., Hayajneh, M., and Serhani, M.A. (2022). Federated learning in edge computing: A systematic survey. Sensors, 22.","DOI":"10.3390\/s22020450"},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Feng, Y., Qi, Y., Li, H., Wang, X., and Tian, J. (2024, January 22\u201324). Leveraging federated learning and edge computing for recommendation systems within cloud computing networks. Proceedings of the Third International Symposium on Computer Applications and Information Systems (ISCAIS 2024), Wuhan, China.","DOI":"10.1117\/12.3034773"},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"363","DOI":"10.23919\/JSC.2022.0016","article-title":"Recent Advances of Blockchain and Its Applications","volume":"3","author":"Li","year":"2022","journal-title":"J. Soc. Comput."},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"21942","DOI":"10.1109\/JIOT.2023.3313055","article-title":"A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing","volume":"10","author":"Moore","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Ni, S., He, Y., Chen, L., Wang, Y., and Yu, F. (2023, January 18\u201321). A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning. Proceedings of the 2023 International Conference on Networking and Network Applications (NaNA), Qingdao, China.","DOI":"10.1109\/NaNA60121.2023.00027"},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JBHI.2022.3157725","article-title":"Privacy-preserving federated learning for internet of medical things under edge computing","volume":"27","author":"Wang","year":"2022","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Mahbub, M., Gazi, M.S.A., Provat, S.A.A., and Islam, M.S. (2020, January 21\u201322). Multi-access edge computing-aware internet of things: MEC-IoT. Proceedings of the 2020 Emerging Technology in Computing, Communication and Electronics (ETCCE), Dhaka, Bangladesh.","DOI":"10.1109\/ETCCE51779.2020.9350909"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Zhang, P., Durresi, M., and Durresi, A. (2018, January 16\u201318). Mobile privacy protection enhanced with multi-access edge computing. Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland.","DOI":"10.1109\/AINA.2018.00109"},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A survey on mobile edge computing: The communication perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Zhang, Y., and Zhang, Y. (2022). The Future of Mobile Edge Computing. Mobile Edge Computing, Springer.","DOI":"10.1007\/978-3-030-83944-4"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Ortega-Fernandez, I., Martinez, S.E.K., Orellana, L.A., Soldatos, J., and Kyriazis, D. (2022). Large Scale Data Anonymisation for GDPR Compliance. Big Data and Artificial Intelligence in Digital Finance, Springer.","DOI":"10.1007\/978-3-030-94590-9_19"},{"key":"ref_176","unstructured":"GDPR (2018). General Data Protection Regulation (GDPR), Intersoft Consulting. Available online: https:\/\/gdpr-info.eu\/art-24-gdpr\/."},{"key":"ref_177","unstructured":"Sensitive Data Protection (2024, February 01). Generalization and Bucketing. Available online: https:\/\/cloud.google.com\/dlp\/docs\/concepts-bucketing#:~:text=Generalization%20is%20the%20process%20of,depending%20on%20the%20data%20type."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_179","unstructured":"Cybersecurity, A. (2024, September 17). Intrusion Detection Systems (IDS) Explained. Available online: https:\/\/cybersecurity.att.com\/solutions\/intrusion-detection-system\/ids-explained."},{"key":"ref_180","doi-asserted-by":"crossref","unstructured":"Rbah, Y., Mahfoudi, M., Balboul, Y., Fattah, M., Mazer, S., Elbekkali, M., and Bernoussi, B. (2022, January 3\u20134). Machine learning and deep learning methods for intrusion detection systems in iomt: A survey. Proceedings of the 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), Meknes, Morocco.","DOI":"10.1109\/IRASET52964.2022.9738218"},{"key":"ref_181","doi-asserted-by":"crossref","unstructured":"Kikissagbe, B.R., and Adda, M. (2024). Machine learning-based intrusion detection methods in IoT systems: A comprehensive review. Electronics, 13.","DOI":"10.3390\/electronics13183601"},{"key":"ref_182","doi-asserted-by":"crossref","first-page":"103598","DOI":"10.1016\/j.cose.2023.103598","article-title":"Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors","volume":"137","author":"Azimjonov","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Belenguer, A., Navaridas, J., and Pascual, J.A. (2022). A review of federated learning in intrusion detection systems for IoT. arXiv.","DOI":"10.2139\/ssrn.4261807"},{"key":"ref_184","first-page":"975","article-title":"A comprehensive analyses of intrusion detection system for IoT environment","volume":"16","author":"Sicato","year":"2020","journal-title":"J. Inf. Process. Syst."},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"4059","DOI":"10.1109\/JIOT.2022.3203249","article-title":"A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions","volume":"10","author":"Arisdakessian","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1080\/19393555.2021.1975853","article-title":"Variables influencing the effectiveness of signature-based network intrusion detection systems","volume":"31","author":"Sommestad","year":"2022","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"D\u00edaz-Verdejo, J., Mu\u00f1oz-Calle, J., Estepa Alonso, A., Estepa Alonso, R., and Madinabeitia, G. (2022). On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl. Sci., 12.","DOI":"10.3390\/app12020852"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Nawaal, B., Haider, U., Khan, I.U., and Fayaz, M. (2024). Signature-based intrusion detection system for IoT. Cyber Security for Next-Generation Computing Technologies, CRC Press.","DOI":"10.1201\/9781003404361-8"},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","article-title":"An ensemble learning based intrusion detection model for industrial IoT security","volume":"6","author":"Guezzaz","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"ref_190","doi-asserted-by":"crossref","unstructured":"Seng, S., Garcia-Alfaro, J., and Laarouchi, Y. (2021, January 12\u201314). Why anomaly-based intrusion detection systems have not yet conquered the industrial market?. Proceedings of the International Symposium on Foundations and Practice of Security, Ottawa, ON, Canada.","DOI":"10.1007\/978-3-031-08147-7_23"},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"50078","DOI":"10.1109\/ACCESS.2021.3068961","article-title":"Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network","volume":"9","author":"Tufan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_192","first-page":"20","article-title":"Analysis of machine learning techniques for anomaly-based intrusion detection","volume":"12","author":"Yaokumah","year":"2020","journal-title":"Int. J. Distrib. Artif. Intell. (IJDAI)"},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Sadhu, P.K., Yanambaka, V.P., and Abdelgawad, A. (2022). Internet of things: Security and solutions survey. Sensors, 22.","DOI":"10.3390\/s22197433"},{"key":"ref_194","doi-asserted-by":"crossref","unstructured":"Sidhu, S., Mohd, B.J., and Hayajneh, T. (2019). Hardware security in IoT devices with emphasis on hardware trojans. J. Sens. Actuator Netw., 8.","DOI":"10.3390\/jsan8030042"},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","article-title":"An overview of hardware security and trust: Threats, countermeasures, and design tools","volume":"40","author":"Hu","year":"2020","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MM.2017.4241357","article-title":"Hardware designs for security in ultra-low-power IoT systems: An overview and survey","volume":"37","author":"Yang","year":"2017","journal-title":"IEEE Micro"},{"key":"ref_198","first-page":"11","article-title":"Hardware security for IoT identity assurance","volume":"9","author":"Cirne","year":"2021","journal-title":"Development"},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"100888","DOI":"10.1016\/j.iot.2023.100888","article-title":"A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain","volume":"23","author":"Pourrahmani","year":"2023","journal-title":"Internet Things"},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"763","DOI":"10.3390\/electronics4040763","article-title":"Introduction to hardware security","volume":"4","author":"Jin","year":"2015","journal-title":"Electronics"},{"key":"ref_201","doi-asserted-by":"crossref","unstructured":"Rahman, M.T., Shi, Q., Tajik, S., Shen, H., Woodard, D.L., Tehranipoor, M., and Asadizanjani, N. (2018, January 2\u20134). Physical inspection & attacks: New frontier in hardware security. Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Costa Brava, Spain.","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"ref_202","doi-asserted-by":"crossref","first-page":"5724168","DOI":"10.1155\/2022\/5724168","article-title":"A review of security and privacy concerns in the internet of things (IoT)","volume":"2022","author":"Aqeel","year":"2022","journal-title":"J. Sens."},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MCAS.2021.3092532","article-title":"Hardware security exploiting post-CMOS devices: Fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap","volume":"21","author":"Japa","year":"2021","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_204","doi-asserted-by":"crossref","unstructured":"Li, K.F., and Attarmoghaddam, N. (2018, January 16\u201318). Challenges and methodologies of hardware security. Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland.","DOI":"10.1109\/AINA.2018.00136"},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"020019","DOI":"10.1063\/5.0099518","article-title":"Sensor network hardware security","volume":"2570","author":"Tsvetanov","year":"2022","journal-title":"AIP Conf. Proc."},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Batina, L., Jauernig, P., Mentens, N., Sadeghi, A.R., and Stapf, E. (2019, January 2\u20136). INVITED: In Hardware We Trust: Gains and Pains of Hardware-assisted Security. Proceedings of the 2019 56th ACM\/IEEE Design Automation Conference (DAC), Las Vegas, NV, USA.","DOI":"10.1145\/3316781.3323480"},{"key":"ref_207","doi-asserted-by":"crossref","first-page":"6222","DOI":"10.1109\/JIOT.2020.3025775","article-title":"A survey on supply chain security: Application areas, security threats, and solution architectures","volume":"8","author":"Hassija","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_208","doi-asserted-by":"crossref","unstructured":"Obeng, Y., Nolan, C., and Brown, D. (2016, January 14\u201318). Hardware security through chain assurance. Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.3850\/9783981537079_0991"},{"key":"ref_209","doi-asserted-by":"crossref","unstructured":"Akter, S., Khalil, K., and Bayoumi, M. (2023, January 5\u20138). Hardware security in the internet of things: A survey. Proceedings of the 2023 IEEE 36th International System-on-Chip Conference (SOCC), Santa Clara, CA, USA.","DOI":"10.1109\/SOCC58585.2023.10256974"},{"key":"ref_210","first-page":"271","article-title":"Hardware security threats and countermeasures: A study of obfuscation, camouflaging and PUFs","volume":"3","author":"Maharmeh","year":"2019","journal-title":"Int. J. Multimed. Intell. Secur."},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"77543","DOI":"10.1109\/ACCESS.2023.3288696","article-title":"A survey on hardware security: Current trends and challenges","volume":"11","author":"Akter","year":"2023","journal-title":"IEEE Access"},{"key":"ref_212","doi-asserted-by":"crossref","unstructured":"Babaei, A., and Schiele, G. (2019). Physical unclonable functions in the internet of things: State of the art and open challenges. Sensors, 19.","DOI":"10.3390\/s19143208"},{"key":"ref_213","doi-asserted-by":"crossref","unstructured":"Shariffuddin, S., Sivamangai, N., Napolean, A., Naveenkumar, R., Kamalnath, S., and Saranya, G. (2022, January 21\u201322). Review on Arbiter Physical Unclonable Function and its Implementation in FPGA for IoT Security Applications. Proceedings of the 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India.","DOI":"10.1109\/ICDCS54290.2022.9780766"},{"key":"ref_214","doi-asserted-by":"crossref","unstructured":"Al-Meer, A., and Al-Kuwari, S. (2022). Physical Unclonable Functions (PUF) for IoT Devices. arXiv.","DOI":"10.1145\/3591464"},{"key":"ref_215","unstructured":"Bergfalck, L., and Engstr\u00f6m, J. (2021). Designing a Physical Unclonable Function for Cryptographic Hardware, Link\u00f6ping University."},{"key":"ref_216","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TVLSI.2017.2759731","article-title":"A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions","volume":"26","author":"Liu","year":"2017","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_217","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/JETCAS.2021.3075767","article-title":"Introducing Recurrence in Strong PUFs for Enhanced Machine Learning Attack Resistance","volume":"11","author":"Shah","year":"2021","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."},{"key":"ref_218","doi-asserted-by":"crossref","first-page":"4426","DOI":"10.1109\/TCAD.2020.2969645","article-title":"Mathematical Modeling Analysis of Strong Physical Unclonable Functions","volume":"39","author":"Xu","year":"2020","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_219","doi-asserted-by":"crossref","first-page":"105977","DOI":"10.1016\/j.mejo.2023.105977","article-title":"Machine learning attacks resistant strong PUF design utilizing response obfuscates challenge with lower hardware overhead","volume":"142","author":"Ma","year":"2023","journal-title":"Microelectron. J."},{"key":"ref_220","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, J., Wu, J., Wu, S., Huang, Z., and Zhang, K. (2023). Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review. Mathematics, 12.","DOI":"10.3390\/math12010077"},{"key":"ref_221","unstructured":"Su, H. (2021). Novel Design in Mixed-Signal and Machine Learning Resilient Architecture Physical Unclonable Functions. [Ph.D. Thesis, University of Southampton]."},{"key":"ref_222","doi-asserted-by":"crossref","unstructured":"Magyari, A., and Chen, Y. (2023). Integrating Lorenz Hyperchaotic Encryption with Ring Oscillator Physically Unclonable Functions (RO-PUFs) for High-Throughput Internet of Things (IoT) Applications. Electronics, 12.","DOI":"10.3390\/electronics12244929"},{"key":"ref_223","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Mursi, K.T., and Gaoxiang, L. (2021). A challenge obfuscating interface for arbiter PUF variants against machine learning attacks. arXiv.","DOI":"10.1109\/ISVLSI54635.2022.00094"},{"key":"ref_224","doi-asserted-by":"crossref","unstructured":"Avvaru, S.V.S., Zhou, C., Satapathy, S., Lao, Y., Kim, C.H., and Parhi, K.K. (2016, January 14\u201318). Estimating delay differences of arbiter PUFs using silicon data. Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.3850\/9783981537079_0926"},{"key":"ref_225","doi-asserted-by":"crossref","first-page":"3203","DOI":"10.1038\/s41467-024-47479-y","article-title":"All-silicon multidimensionally-encoded optical physical unclonable functions for integrated circuit anti-counterfeiting","volume":"15","author":"Wang","year":"2024","journal-title":"Nat. Commun."},{"key":"ref_226","doi-asserted-by":"crossref","unstructured":"Chung, M.K., Kim, M.U., Han, J.W., Yang, J.S., Kim, B.J., Jo, M.S., Jung, S.Y., Kim, S.H., and Yoon, J.B. (2024, January 21\u201325). Contribution of MEMS to Physical Unclonable Functions (PUFs): Random Configuration of PDMS Nano-Structure for Optical PUF. Proceedings of the 2024 IEEE 37th International Conference on Micro Electro Mechanical Systems (MEMS), Austin, TX, USA.","DOI":"10.1109\/MEMS58180.2024.10439354"},{"key":"ref_227","doi-asserted-by":"crossref","first-page":"2709","DOI":"10.1109\/JSSC.2018.2850941","article-title":"CMOS optical PUFs using noise-immune process-sensitive photonic crystals incorporating passive variations for robustness","volume":"53","author":"Lu","year":"2018","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_228","doi-asserted-by":"crossref","unstructured":"Yavuz, S., Naroska, E., and Daniel, K. (2024, January 6\u20138). Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review. Proceedings of the 2024 IEEE Conference on Dependable and Secure Computing (DSC), Tokyo, Japan.","DOI":"10.1109\/DSC63325.2024.00021"},{"key":"ref_229","doi-asserted-by":"crossref","unstructured":"Yuyuan, L., and Xueqiang, S. (2024). A Highly Reliable Reconfigurable SRAM PUF Based on Error Correction Codes and Capacitor Preselection. Authorea, preprints.","DOI":"10.36227\/techrxiv.170956662.28387685\/v1"},{"key":"ref_230","unstructured":"R\u00fchrmair, U. (2025, April 11). On the Security of PUF Protocols Under Bad PUFs and PUFs-Inside-PUFs Attacks. Cryptology ePrint Archive, Paper 2016\/322, Available online: https:\/\/eprint.iacr.org\/2016\/322."},{"key":"ref_231","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_232","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/TCSI.2020.3028508","article-title":"Set-based obfuscation for strong PUFs against machine learning attacks","volume":"68","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_233","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TVLSI.2021.3129141","article-title":"Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives","volume":"30","author":"Kroeger","year":"2022","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_234","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xi, X., and Orshansky, M. (2020, January 7\u201311). Lattice PUF: A strong physical unclonable function provably secure against machine learning attacks. Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), San Jose, CA, USA.","DOI":"10.1109\/HOST45689.2020.9300270"},{"key":"ref_235","doi-asserted-by":"crossref","first-page":"105667","DOI":"10.1016\/j.mejo.2022.105667","article-title":"A challenge-screening strategy for enhancing the stability of strong PUF based on machine learning","volume":"131","author":"Zhou","year":"2023","journal-title":"Microelectron. J."},{"key":"ref_236","doi-asserted-by":"crossref","first-page":"4433","DOI":"10.1109\/TCAD.2022.3197696","article-title":"Flam-puf: A response\u2013feedback-based lightweight anti-machine-learning-attack puf","volume":"41","author":"Wu","year":"2022","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_237","doi-asserted-by":"crossref","unstructured":"Zhu, B., Jiang, X., Huang, K., and Yu, M. (2023). A Response-Feedback-Based Strong PUF with Improved Strict Avalanche Criterion and Reliability. Sensors, 24.","DOI":"10.3390\/s24010093"},{"key":"ref_238","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/TCSI.2024.3466972","article-title":"A High-Reliability, Non-CRP-Discard Arbiter PUF Based on Delay Difference Quantization","volume":"72","author":"Wang","year":"2024","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_239","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TEVC.2021.3081478","article-title":"A dynamically configurable PUF and dynamic matching authentication protocol","volume":"10","author":"Wang","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_240","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JIOT.2023.3285930","article-title":"Bagua Protocol: A Whole-Process Configurable Protocol for IoT Sensing Devices Security Based on Strong PUF","volume":"11","author":"Zhou","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_241","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Li, G., Wang, P., and Ye, M. (2021, January 26\u201329). Matrix encryption based anti-machine learning attack algorithm for strong PUF. Proceedings of the 2021 IEEE 14th International Conference on ASIC (ASICON), Kunming, China.","DOI":"10.1109\/ASICON52560.2021.9620491"},{"key":"ref_242","doi-asserted-by":"crossref","unstructured":"Tun, N.W., and Mambo, M. (2024). Secure PUF-Based Authentication Systems. Sensors, 24.","DOI":"10.3390\/s24165295"},{"key":"ref_243","doi-asserted-by":"crossref","unstructured":"Felicetti, C., Lanuzza, M., Rullo, A., Sacc\u00e0, D., and Crupi, F. (2021, January 13\u201315). Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC. Proceedings of the 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), Jeju, Republic of Korea.","DOI":"10.1109\/SmartIoT52359.2021.00043"},{"key":"ref_244","unstructured":"Zhuang, Y., and Li, G. (2024). A lightweight PUF-based authentication protocol. arXiv."},{"key":"ref_245","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s13389-022-00284-z","article-title":"Programmable access-controlled and generic erasable PUF design and its applications","volume":"12","author":"Jin","year":"2022","journal-title":"J. Cryptogr. Eng."},{"key":"ref_246","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.1587\/transfun.2022EAP1151","article-title":"FOM-CDS PUF: A Novel Configurable Dual State Strong PUF Based on Feedback Obfuscation Mechanism against Modeling Attacks","volume":"106","author":"Li","year":"2023","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_247","doi-asserted-by":"crossref","unstructured":"Dubrova, E., N\u00e4slund, O., Degen, B., Gawell, A., and Yu, Y. (2019, January 17\u201319). CRC-PUF: A machine learning attack resistant lightweight PUF construction. Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden.","DOI":"10.1109\/EuroSPW.2019.00036"},{"key":"ref_248","doi-asserted-by":"crossref","first-page":"3958","DOI":"10.1109\/TIFS.2021.3089854","article-title":"A SC PUF standard cell used for key generation and anti-invasive-attack protection","volume":"16","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_249","unstructured":"Lee, S., Oh, M.K., Kang, Y., and Choi, D. (2020). RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devices. Proceedings of the Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, Republic of Korea, 21\u201324 August 2019, Springer. Revised Selected Papers 20."},{"key":"ref_250","doi-asserted-by":"crossref","first-page":"8883","DOI":"10.1109\/JIOT.2021.3117762","article-title":"Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_251","doi-asserted-by":"crossref","unstructured":"Asif, R., Ghanem, K., and Irvine, J. (2020). Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy. Sensors, 21.","DOI":"10.3390\/s21010028"},{"key":"ref_252","doi-asserted-by":"crossref","unstructured":"Choi, S., Zage, D., Choe, Y.R., and Wasilow, B. (July, January 27). Physically Unclonable Digital ID. Proceedings of the 2015 IEEE International Conference on Mobile Services, New York City, NY, USA.","DOI":"10.1109\/MobServ.2015.24"},{"key":"ref_253","unstructured":"P, S., and Krishnammal, P.M. (2016, January 23\u201325). Study of different silicon Physical Unclonable Functions. Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India."},{"key":"ref_254","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPOT.2015.2490261","article-title":"Everything you wanted to know about PUFs","volume":"36","author":"Joshi","year":"2017","journal-title":"IEEE Potentials"},{"key":"ref_255","doi-asserted-by":"crossref","unstructured":"Ram, S.K., Sahoo, S.R., Das, B.B., Mahapatra, K., and Mohanty, S.P. (2025, April 11). Securing Things: A Novel CRO Applicable in PUF and Recycled IC Detection. 2 June 2022, PREPRINT (Version 1). Available online: https:\/\/www.researchsquare.com\/article\/rs-1702083\/v1.","DOI":"10.21203\/rs.3.rs-1702083\/v1"},{"key":"ref_256","unstructured":"Bhargava, M. (2013). Reliable, Secure, Efficient Physical Unclonable Functions. [Ph.D. Thesis, Carnegie Mellon University]."},{"key":"ref_257","doi-asserted-by":"crossref","unstructured":"Schaub, A., Danger, J.L., Rioul, O., and Guilley, S. (2020, January 7\u201310). The big picture of delay-PUF dependability. Proceedings of the 2020 European Conference on Circuit Theory and Design (ECCTD), Sofia, Bulgaria.","DOI":"10.1109\/ECCTD49232.2020.9218396"},{"key":"ref_258","doi-asserted-by":"crossref","unstructured":"Jouini, Z.C., Danger, J.L., and Bossuet, L. (2011, January 26\u201329). Performance evaluation of physically unclonable function by delay statistics. Proceedings of the 2011 IEEE 9th International New Circuits and Systems Conference, Bordeaux, France.","DOI":"10.1109\/NEWCAS.2011.5981324"},{"key":"ref_259","doi-asserted-by":"crossref","unstructured":"Fedorkow, G., and Hardjono, T. (2024). Mind Your Roots of Trust!. Authorea, preprints.","DOI":"10.36227\/techrxiv.172470832.21094305\/v1"},{"key":"ref_260","unstructured":"CYSEC (2024, October 30). Securing Edge Devices: The Crucial Role of Root of Trust in a Connected World. Available online: https:\/\/www.cysec.com\/iot-edge\/."},{"key":"ref_261","unstructured":"Knowledge Center, S.E. (2024, October 30). Root of Trust: Trusted Environment for Secure Functions. Available online: https:\/\/semiengineering.com\/knowledge_centers\/semiconductor-security\/root-of-trust\/."},{"key":"ref_262","unstructured":"Zimmer, V., and Krau, M. (2024, October 30). Establishing the Root of Trust. August 2016. Available online: https:\/\/www.researchgate.net\/profile\/Vincent-Zimmer-5\/publication\/307478971_Establishing_the_Root_of_Trust\/links\/668c7406c1cf0d77ffc3837b\/Establishing-the-Root-of-Trust.pdf."},{"key":"ref_263","doi-asserted-by":"crossref","unstructured":"Ehret, A., Moore, P., Stojkov, M., and Kinsy, M.A. (2023, January 25\u201329). Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures. Proceedings of the 2023 IEEE High Performance Extreme Computing Conference (HPEC), Boston, MA, USA.","DOI":"10.1109\/HPEC58863.2023.10363457"},{"key":"ref_264","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1049\/iet-sen.2018.5291","article-title":"Optical PUFs as physical root of trust for blockchain-driven applications","volume":"13","author":"Chaintoutis","year":"2019","journal-title":"IET Softw."},{"key":"ref_265","doi-asserted-by":"crossref","unstructured":"Rojas-Mu\u00f1oz, L.F., S\u00e1nchez-Solano, S., Mart\u00ednez-Rodr\u00edguez, M.C., Camacho-Ruiz, E., Navarro-Torrero, P., Karmakar, A., Fern\u00e1ndez-Garc\u00eda, C., Tena-S\u00e1nchez, E., Potestad-Ord\u00f3\u00f1ez, F.E., and Casado-Gal\u00e1n, A. (2024, January 20\u201322). Cryptographic Security Through a Hardware Root of Trust. Proceedings of the International Symposium on Applied Reconfigurable Computing, Aveiro, Portugal.","DOI":"10.1007\/978-3-031-55673-9_8"},{"key":"ref_266","doi-asserted-by":"crossref","unstructured":"Chuang, K.K.H., Chen, H.M., Wu, M.Y., Yang, E.C.S., and Hsu, C.C.H. (2021, January 19\u201322). Quantum Tunneling PUF: A Chip Fingerprint for Hardware Security. Proceedings of the 2021 International Symposium on VLSI Technology, Systems and Applications (VLSI-TSA), Hsinchu, Taiwan.","DOI":"10.1109\/VLSI-TSA51926.2021.9440114"},{"key":"ref_267","doi-asserted-by":"crossref","unstructured":"Hamadeh, H., and Tyagi, A. (2019, January 16\u201318). Physical unclonable functions (pufs) entangled trusted computing base. Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS), Rourkela, India.","DOI":"10.1109\/iSES47678.2019.00047"},{"key":"ref_268","doi-asserted-by":"crossref","unstructured":"Bathalapalli, V.K., Mohanty, S.P., Kougianos, E., Iyer, V., and Rout, B. (2023, January 5\u20137). PUFchain 4.0: Integrating PUF-based TPM in distributed ledger for security-by-design of IoT. Proceedings of the Great Lakes Symposium on VLSI 2023, Knoxville, TN, USA.","DOI":"10.1145\/3583781.3590206"},{"key":"ref_269","doi-asserted-by":"crossref","first-page":"1988","DOI":"10.1109\/TIFS.2017.2689726","article-title":"Key reconciliation protocols for error correction of silicon PUF responses","volume":"12","author":"Colombier","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_270","unstructured":"Schrijen, G.J., and Garlati, C. (March, January 27). Physical unclonable functions to the rescue. Proceedings of the Embedded World, Nuremberg, Germany."},{"key":"ref_271","unstructured":"Dave McCarthy, P.R., and Kanaracus, C. (2022). Increasing Intelligence at the Edge with AI, International Data Corporation (IDC). Technical Report."},{"key":"ref_272","unstructured":"Ahmad, J., Jervis, M., and Venkata, R. (2022). Intel\u00ae FPGAs and SoCs with Intel\u00ae FPGA AI Suite and OpenVINO Toolkit Drive Embedded\/Edge AI\/Machine Learning Applications, Infotech."},{"key":"ref_273","doi-asserted-by":"crossref","first-page":"2610","DOI":"10.1109\/TMC.2020.3041781","article-title":"The Case for FPGA-Based Edge Computing","volume":"21","author":"Xu","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_274","first-page":"446","article-title":"FPGA-based symmetric re-encryption scheme to secure data processing for cloud-integrated internet of things","volume":"6","author":"Elrabaa","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_275","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-Rodr\u00edguez, M.C., Rojas-Mu\u00f1oz, L.F., Camacho-Ruiz, E., S\u00e1nchez-Solano, S., and Brox, P. (2022). Efficient RO-PUF for generation of identifiers and keys in resource-constrained embedded systems. Cryptography, 6.","DOI":"10.20944\/preprints202209.0129.v1"},{"key":"ref_276","doi-asserted-by":"crossref","first-page":"e6764","DOI":"10.1002\/cpe.6764","article-title":"Edge enhanced deep learning system for IoT edge device security analytics","volume":"35","author":"Mukhtar","year":"2021","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_277","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1109\/MDT.2008.166","article-title":"Managing security in FPGA-based embedded systems","volume":"25","author":"Huffmire","year":"2008","journal-title":"IEEE Des. Test Comput."},{"key":"ref_278","doi-asserted-by":"crossref","first-page":"109167","DOI":"10.1109\/ACCESS.2022.3214214","article-title":"Anatomy of Deep Learning Image Classification and Object Detection on Commercial Edge Devices: A Case Study on Face Mask Detection","volume":"10","author":"Kolosov","year":"2022","journal-title":"IEEE Access"},{"key":"ref_279","unstructured":"(2022). Vitis AI Library User Guide\u2014UG1354 (v2.0), AMD."},{"key":"ref_280","doi-asserted-by":"crossref","first-page":"11768","DOI":"10.1109\/ACCESS.2017.2716782","article-title":"Towards a secure mobile edge computing framework for Hajj","volume":"5","author":"Rahman","year":"2017","journal-title":"IEEE Access"},{"key":"ref_281","doi-asserted-by":"crossref","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","article-title":"An overview on edge computing research","volume":"8","author":"Cao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_282","doi-asserted-by":"crossref","first-page":"2970","DOI":"10.55248\/gengpi.5.1024.2903","article-title":"Enhancing Data Forensics through Edge Computing in IoT Environments","volume":"5","author":"Williams","year":"2024","journal-title":"Int. J. Res. Publ. Rev."},{"key":"ref_283","doi-asserted-by":"crossref","first-page":"15639","DOI":"10.1109\/JIOT.2022.3150042","article-title":"Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing","volume":"9","author":"Ming","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_284","unstructured":"Wang, Y., and Yang, X. (2025). Research on Edge Computing and Cloud Collaborative Resource Scheduling Optimization Based on Deep Reinforcement Learning. arXiv."},{"key":"ref_285","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/COMST.2021.3106401","article-title":"Resource scheduling in edge computing: A survey","volume":"23","author":"Luo","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_286","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3339474","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"ref_287","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2021.07.077","article-title":"An improved matrix factorization based model for many-objective optimization recommendation","volume":"579","author":"Cui","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_288","doi-asserted-by":"crossref","unstructured":"Zhai, K., Ren, Q., Wang, J., and Yan, C. (2021). Byzantine-robust federated learning via credibility assessment on non-IID data. arXiv.","DOI":"10.3934\/mbe.2022078"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/175\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:15:32Z","timestamp":1760030132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,16]]},"references-count":288,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040175"],"URL":"https:\/\/doi.org\/10.3390\/fi17040175","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,16]]}}}