<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>http://www.edgecomputingbook.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ali+Siddiqi</id>
	<title>Edge Computing Wiki - User contributions [en-gb]</title>
	<link rel="self" type="application/atom+xml" href="http://www.edgecomputingbook.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ali+Siddiqi"/>
	<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php/Special:Contributions/Ali_Siddiqi"/>
	<updated>2026-04-16T15:16:42Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.0</generator>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=691</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=691"/>
		<updated>2025-04-16T20:12:34Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Malware Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either  device-side or server-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications and &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=690</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=690"/>
		<updated>2025-04-16T20:11:29Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Malware Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either  device-side or server-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=689</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=689"/>
		<updated>2025-04-16T20:10:20Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Malware Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=688</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=688"/>
		<updated>2025-04-16T20:09:28Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=687</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=687"/>
		<updated>2025-04-16T20:08:27Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=686</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=686"/>
		<updated>2025-04-16T20:05:52Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=685</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=685"/>
		<updated>2025-04-16T20:05:12Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=684</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=684"/>
		<updated>2025-04-16T20:04:10Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
#&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
#&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=683</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=683"/>
		<updated>2025-04-16T20:03:02Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid.&lt;br /&gt;
*&#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &lt;br /&gt;
*&#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &lt;br /&gt;
*&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &lt;br /&gt;
*&#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, the content that will be discussed is about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
===Privacy Issues in Fog Computing===&lt;br /&gt;
&lt;br /&gt;
====Attack Vectors====&lt;br /&gt;
----&lt;br /&gt;
Below are some of the major attack vectors that plague existing edge and fog networks.&lt;br /&gt;
; Forgery&lt;br /&gt;
:Forgery is a security threat where the attacker copies someone else&#039;s identities and behavior by producing fake information. This is a serious issue that degrades existing network resources for everyone in the network. &lt;br /&gt;
;Tampering&lt;br /&gt;
: Attackers alter data that is to be sent to other websites. This is difficult to detect since users in an edge environment are mobile and we can&#039;t differentiate if the data has been tampered with or anomalous behavior is due to packet loss. &lt;br /&gt;
;Spam&lt;br /&gt;
:Attackers send fake information that overwhelms the processing power of the edge devices. Similar to DoS, on a smaller scale.&lt;br /&gt;
;Sybil&lt;br /&gt;
:Attackers fake identity to control the performance of edge network. Falsifying their identity allows them to create fake crowdsensing reports, which affects the reliability of the whole network.&lt;br /&gt;
;Jamming&lt;br /&gt;
:Attackers generate large amounts of packets to jam transmission channels and occupy important resources&lt;br /&gt;
;Eavesdropping&lt;br /&gt;
:Attackers listen to confidential data of genuine users from transmission channel by pretending to be a part of the network&lt;br /&gt;
; Man in the Middle (MITM)&lt;br /&gt;
: MITM is a type of cyberattack where the attacker not only eavesdrops on communication between two devices, but also modifies the payload for destructive payloads.&lt;br /&gt;
;Collusion&lt;br /&gt;
:Multiple groups band together to mislead fog nodes&lt;br /&gt;
;Impersonation&lt;br /&gt;
:Attacker acts as real server to trick users to steal all their data &lt;br /&gt;
;Virtual Machine Attack&lt;br /&gt;
:Attackers take control of hypervisor for the virtual machine&#039;s VM&lt;br /&gt;
;Side channel&lt;br /&gt;
: Attackers brute force passwords to steal information being shared between two parties. Due to the poor resource availability of edge devices, there is a constraint on the use of computationally expensive hashing algorithms.&lt;br /&gt;
; Session Hijacking&lt;br /&gt;
: Attackers intercept and steal user session to get access to confidential data &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Privacy Issues in Fog Computing ====&lt;br /&gt;
# User privacy&lt;br /&gt;
## fog computing contains large number of IoT devices that are inter-connected via sensors &lt;br /&gt;
## generated  senesitive data and transmit to fog nodse for processing. This sensitive data includes personal information which can be stolen&lt;br /&gt;
# Identity Privacy&lt;br /&gt;
## ID of users is extremely vulnerable of getting disclosed while having auth to nodes including name, phone , address&lt;br /&gt;
# Data Privacy&lt;br /&gt;
## data can be exposed to network attacker who is trying to steam user&#039;s personal data from the transmission medium or relay nodes&lt;br /&gt;
# Usage privacy&lt;br /&gt;
## Pattern in which accesses services of fog computing &lt;br /&gt;
## intruder knows when user is accessing the channel for data transmission and when he is not communicating&lt;br /&gt;
## intruder attacks on user&#039;s confidential information or the channel&lt;br /&gt;
# Location Privacy&lt;br /&gt;
## location privacy helps attackers know the trajectory of the user&lt;br /&gt;
# Network Privacy &lt;br /&gt;
## wireless connections always at risk&lt;br /&gt;
## maintenance of fog nodes is challenging since they are present at edge of internet&lt;br /&gt;
## privacy breach is not difficult to occur&lt;br /&gt;
&lt;br /&gt;
=== Security and Privacy issues for edge computing===&lt;br /&gt;
# nodes of edge connected to large number of IoT&lt;br /&gt;
## these have limited resources &lt;br /&gt;
## heterogeneous internal components&lt;br /&gt;
## Key management for ensuring privacy of data is difficult&lt;br /&gt;
&lt;br /&gt;
==== Issues ====&lt;br /&gt;
# Edge nodes are near to users which makes large amount of sensitive data, which might be stolen &lt;br /&gt;
# Edge computing possess low network resources so doesn&#039;t support expensive encryption algos &lt;br /&gt;
# Edge environment consists of dynamic env which is changing, which allows attackers multiple ways to join the network&lt;br /&gt;
  Also difficult to create securiy rules for a changing network&lt;br /&gt;
&lt;br /&gt;
==== Attacks ====&lt;br /&gt;
; Eavesdropping: Monitor channel to steal data&lt;br /&gt;
;# DoS&lt;br /&gt;
: take control of network by sending fake requests&lt;br /&gt;
;# DDoS&lt;br /&gt;
: interrupt normal services provided by different servers&lt;br /&gt;
;# Data Tampering&lt;br /&gt;
: Attacker can alter the data transmitted over comm channel &lt;br /&gt;
;False data injection&lt;br /&gt;
:Attacker injects false code in network which brings all data to the attacker&lt;br /&gt;
;Physical attack&lt;br /&gt;
:Physical protection of edge infra is weak, which allows attackers to compromise the physical locations of edge devices.&lt;br /&gt;
; Rogue gateway&lt;br /&gt;
:inject large amounts of traffic into edge network infra, similar to MITM &lt;br /&gt;
&lt;br /&gt;
==== Privacy issues in edge computing =====&lt;br /&gt;
# weak security techniques for system protection&lt;br /&gt;
# unsafe communication between devices&lt;br /&gt;
# difficult recovery and data backup&lt;br /&gt;
# no specific pattern of update reception &lt;br /&gt;
# lack of proper network visibility&lt;br /&gt;
# lack of user&#039;s selective data collection&lt;br /&gt;
&lt;br /&gt;
==== Countermeasures for Fog Computing ====&lt;br /&gt;
;Efficient encryption techniques&lt;br /&gt;
:Allows for resource constrained edge devices to encrypt communcations with complex algorithms  &lt;br /&gt;
;Decoy technique&lt;br /&gt;
:Authenticate data of user present the computing network by replacing original information with fake information that is provided to attackers&lt;br /&gt;
 When breached, the attackers find the decoy files &lt;br /&gt;
;Intrusion detection system&lt;br /&gt;
:Detect and protect from attacks including DoS, insider attackers, port scanning attacks, flooding attacks on virtual machine, MITM&lt;br /&gt;
;Blockchain security for fog computing&lt;br /&gt;
:Blockchain is a way to cryptographically ensure the validity of a system while simultaneously increasing it&#039;s security. Using blockchain for edge computing reduces single point failure, increases network security and helps with tracking node status effectively.&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
To further illustrate the edge computer security concepts, we will give a couple of short case studies where edge&lt;br /&gt;
computing security plays a prevalent role, as well as some solutions:&lt;br /&gt;
&lt;br /&gt;
===Securing Egyptian VMSs Smart City Infrastructure===&lt;br /&gt;
Over hundreds of thousands of these edge devices such as traffic sensors, surveillance cameras,&lt;br /&gt;
smart lighting systems, and environmental monitors are deployed in an urban Smart City. We&lt;br /&gt;
have on the `the city edge cloud&#039; these instruments for real-time traffic flow management, public&lt;br /&gt;
safety alarm, environmental monitoring with life supports among the green plants – in the area&lt;br /&gt;
usually known as! This city suffered a massive blackout, when multiple traffic lights were compromised at the source which caused them to act irregularly: Not&lt;br /&gt;
issuing signals, leading to gridlocks.&lt;br /&gt;
====Challenges:====&lt;br /&gt;
How were the traffic controllers found to be vulnerable? Meaning they hack the password hole&lt;br /&gt;
punch so they can bypass the external username password and gain direct access to the temples&lt;br /&gt;
of our data. Moreover, on some cameras, the public IP of that camera is exposed, making remote&lt;br /&gt;
attack possible: it was obviously a disadvantage for them. The edge network stutters steps from&lt;br /&gt;
one organization to the next, making it hard however much one tries to apply security policy&lt;br /&gt;
uniformly, as whose department is solely responsible for a given thing?&lt;br /&gt;
====Solutions Introduced:====&lt;br /&gt;
;Net Separation&lt;br /&gt;
: The city designed its infrastructure with isolation zones; meaning traffic&lt;br /&gt;
systems are completely isolated from all other municipal services so if one zone is attacked all&lt;br /&gt;
other zones of that type remain intact.&lt;br /&gt;
;Password Overhaul&lt;br /&gt;
: Each unit was provided with a complete rehash to change its default&lt;br /&gt;
passwords and other weak credentials to hardened unique passwords. Remote administrative&lt;br /&gt;
access was only accepted with Multi-Factor Authentication.&lt;br /&gt;
;Embrace of a Zero Trust Model&lt;br /&gt;
: In this city, we employed a robust, Zero Trust model. A&lt;br /&gt;
central token service gives authorization to every device communication and does not assume&lt;br /&gt;
the inherent trust of devices.&lt;br /&gt;
;Firmware Handling&lt;br /&gt;
: The OTA management system required by installation ensures known&lt;br /&gt;
exploits like traffic light management are repaired when discovered. Firmware cannot be&lt;br /&gt;
updated at weaker sites as the assumption is it is regularly updated.&lt;br /&gt;
;AI-based IDS Deployment&lt;br /&gt;
: An AI-based IDS at a traffic control center learns about every&lt;br /&gt;
equipment normal behavior going on at this session (like how frequently commands are sent out&lt;br /&gt;
for lighting systems) generate alerts, activate promise lockdowns any time an abnormal behavior&lt;br /&gt;
appears Mechanisms for rapid dissemination throughout the city.&lt;br /&gt;
==== Outcome:====&lt;br /&gt;
As a result of the proactive settings, these attempts were quickly identified and contained, with a&lt;br /&gt;
limited impact on operations. For example, a virus event that targeted digital kiosks was&lt;br /&gt;
contained through micro-segmentation and AI detection mechanisms that quickly isolated and as&lt;br /&gt;
such quarantined the attack. It led to enhanced overall resilience of this intelligent city — its&lt;br /&gt;
citizens’ trust in IoT services is continually getting better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IIOT (INDUSTRIAL IOT) IN MANUFACTURING===&lt;br /&gt;
The production floor of a manufacturing company has integrated an IIoT system that is edge-&lt;br /&gt;
based. Sensors associated with the machinery connect to edge gateways that track the health of&lt;br /&gt;
the equipment for predictive maintenance. One extreme incident involved the main assembly&lt;br /&gt;
robot producing inaccurate sensor readings that were altered, driving the robot to malfunction&lt;br /&gt;
and claim weeks of expensive downtime on production. This revealed the insertion of an&lt;br /&gt;
unauthorized device, a small single-board computer that was disguised as a sensor node and&lt;br /&gt;
which fed erroneous data back to the control system.&lt;br /&gt;
====CHALLENGES:====&lt;br /&gt;
Even though it was optimized for efficiency, the factory edge network didn&#039;t include a device&lt;br /&gt;
authentication protocol; attackers could access new sensors without the need for tight controls.&lt;br /&gt;
Ensuring up time and keeping operational was prioritized often at the expense of timely&lt;br /&gt;
application of security updates. Moreover, the presence of devices from many vendors further&lt;br /&gt;
complicated efforts to establish consistent security standards, and production engineers received&lt;br /&gt;
little training in cybersecurity best practices.&lt;br /&gt;
====SOLUTIONS IMPLEMENTED====&lt;br /&gt;
To solve these problems, stringent onboarding procedures were put in place: each sensor or&lt;br /&gt;
controller must now present a digital certificate signed by the organization before being allowed&lt;br /&gt;
onto the network. Any unknown device attempting to gain access is rejected and notification&lt;br /&gt;
alerts are immediately sent out to ensure the remedying of bogus sensors does not take place in&lt;br /&gt;
future.&lt;br /&gt;
Additionally, they created a blockchain ledger to monitor device identities and to log any&lt;br /&gt;
configuration changes over time. Every new addition or firmware update triggers a blockchain&lt;br /&gt;
transaction being recorded to guarantee the creation of an immutable audit trail that can be&lt;br /&gt;
reviewed by IT as well as OT (operational technology) teams increasing trust and accountability&lt;br /&gt;
between departments. They segmented their network by listener and gateway: your sensors only&lt;br /&gt;
talk to local gateway, and then your gateway only talks to central controls understanding that if&lt;br /&gt;
any one part is breached there are limitations to how much of your network is attacked. More&lt;br /&gt;
importantly, they rolled out an AI-powered detection system that monitored sensor readings for&lt;br /&gt;
abnormalities.&lt;br /&gt;
For known rogue sensors where outputs were statistically different from expected machine&lt;br /&gt;
behavior; it is likely that ML models would have picked up on this irregularity early enough to&lt;br /&gt;
allow for preemptive safety shutters before doing damage.In addition, maintenance processes&lt;br /&gt;
were revised to ensure that scheduled downtimes were regular intervals of time explicitly&lt;br /&gt;
dedicated towards security (for example, patching software vulnerabilities and routine&lt;br /&gt;
equipment calibration checks). Training of staff on basic cyber hygiene such as ensuring that a&lt;br /&gt;
USB drive or laptop was validated before connecting it into the organization edge networks have&lt;br /&gt;
reduced the threat of the organization network being infected by malware.&lt;br /&gt;
====OUTCOME====&lt;br /&gt;
Then after enhancements made at this facility had enabled quick identification of anomalies; The&lt;br /&gt;
next, an internal attempt by someone trying to connect using unauthorized monitoring tools was&lt;br /&gt;
quickly detected and blocked ensuring nothing could affect operations in our pursuit against&lt;br /&gt;
cyber-physical threats going forward. This includes how to properly secure our edges given their&lt;br /&gt;
unique properties tightly coupled with how data generation happens right at the host itself which&lt;br /&gt;
underlines an edge rather than left assume by further maintaining data access principles and&lt;br /&gt;
protocols as logs have significantly aided audits of compliance as well being fitted into our own&lt;br /&gt;
investigation processes during incidents reducing times taken before identifying potential&lt;br /&gt;
problems where an immutable changelog was adapted into the process itself. Key Takeaways –&lt;br /&gt;
Smart cities &amp;amp; IIOT factories share common challenges yet demonstrate needs for customized&lt;br /&gt;
solutions &amp;amp; technologies but also show similar trends including segmentation, authentication&lt;br /&gt;
continuous supervision Reacting quickly overcoming new challenges through advanced&lt;br /&gt;
technology tools - Artificial Intelligence&amp;amp; Blockchain technologies just to name a few.&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=567</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=567"/>
		<updated>2025-04-07T00:55:46Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Citations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, &amp;quot;Edge Computing Security: State of the Art and Challenges,&amp;quot; in Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, Aug. 2019, doi: 10.1109/JPROC.2019.2918437.&lt;br /&gt;
keywords: {Edge computing;Servers;Task analysis;Security;Cloud computing;Mobile handsets;Computer science;Smart phones;Internet of Things;Network security;Data security;edge computing;Internet of Things;network security},&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=566</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=566"/>
		<updated>2025-04-07T00:54:58Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=511</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=511"/>
		<updated>2025-04-06T21:15:00Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Authorization and Authentication Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=509</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=509"/>
		<updated>2025-04-06T21:13:25Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Malware Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=508</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=508"/>
		<updated>2025-04-06T21:13:03Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Side-Channel Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=507</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=507"/>
		<updated>2025-04-06T21:12:47Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* DDoS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png|300px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png|300px]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=506</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=506"/>
		<updated>2025-04-06T21:12:24Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png|200px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=503</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=503"/>
		<updated>2025-04-06T21:09:18Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* How are attackers able to perform these attacks? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level vulnerabilities, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Protocol-level design flaws&#039;&#039; are caused by many protocols edge computing having adopted design flaws due to their designers mainly focus on utility and user experience rather than not providing security as well. &#039;&#039;Implementation-level flaws&#039;&#039; are logic flaws that can cause security strength to decrease significantly after being proved that it was strictly secure on paper, because developers may misunderstand the foundations of the protocol and migrating a protocol from other platforms to the edge computing platform may cause adaptivity inconsistency. &#039;&#039;Code-level vulnerabilities&#039;&#039; can be system bugs that cause memory failure or corruptness, like stack or heap overflow, and can be caused when a person is programming millions of lines of code but leaves something like a dangling pointer. &#039;&#039;Data correlations&#039;&#039; is caused when there could be hidden correlations between sensitive and insensitive data that edge produces that might not be straightforward to notice, which an attack can abuse using side-channels. &#039;&#039;Lacking in fine-grained access controls&#039;&#039; means that Edge computing systems cannot implement fine-grained access controls, because it cannot be adapted to edge computing due to the more complex and fine-grained permissions scenarios, making it easier to attack edge systems.&lt;br /&gt;
&lt;br /&gt;
Overall, the Edge security challenges can be avoided if there was more attention to the potential vulnerabilities or flaws. In the next sections, they will talk about data privacy on Edge systems, security protocols that Edge systems use to combat attacks on their systems, and real cases about actual security breaches that happened on the edge.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=487</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=487"/>
		<updated>2025-04-06T19:19:34Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* How are attackers able to perform these attacks? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is more than just that. Attackers are able to abuse vulnerabilities and flaws in the Edge systems, specifically protocol-level design flaws, implementation-level flaws, code-level flaws, data correlations, and lacking in fine-grained access controls.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=485</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=485"/>
		<updated>2025-04-06T19:13:47Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe. In this section, we will be talking about the different kinds of attacks that can happen on an Edge server or device, as how they are able to do this.     &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;How are attackers able to perform these attacks?&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
Attackers are able to attack Edge devices or servers using different attack techniques, but it is&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:Dictionaryattack.png&amp;diff=475</id>
		<title>File:Dictionaryattack.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:Dictionaryattack.png&amp;diff=475"/>
		<updated>2025-04-06T18:40:39Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=474</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=474"/>
		<updated>2025-04-06T18:40:25Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Authorization and Authentication Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
When these attacks happen, an attacker can bypass authentication processes and gain unauthorized access by using four techniques: dictionary attacks, attacks exploiting vulnerabilities in authorization protocols, attacks exploiting vulnerabilities in authorization protocols, and overprivileged attacks. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Dictionary attack&#039;&#039; is when an attacker possesses a dictionary containing the most used credentials or passwords and inputs all possible entries in this dictionary in order to brute force a match. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when  attackers look for design flaws in how authentication protocols are being used, like finding vulnerabilities in WPA2 or WPA3 protocols which can give an attacker messages that have encrypted information. They can also use 4G or 5G vulnerabilities in order to find a person&#039;s location and inject fabricated paging messages to mess with them and gain more information. &#039;&#039;Attacks exploiting vulnerabilities in authorization protocols&#039;&#039; are when attackers look for flaws in how authorization protocols are designed, such as an attacker using vulnerabilities in OAuth single sign-in which let them access victims personal information without authorization. &#039;&#039;Overprivileged attacks&#039;&#039; are when attackers are able to develop malicious apps that can do things that they do not have permission to do without needing to authenticate, such as changing door pins and setting off fire alarms in a house. &lt;br /&gt;
&lt;br /&gt;
[[File: dictionaryattack.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:SQLinjectionattack.png&amp;diff=472</id>
		<title>File:SQLinjectionattack.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:SQLinjectionattack.png&amp;diff=472"/>
		<updated>2025-04-06T18:23:52Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=471</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=471"/>
		<updated>2025-04-06T18:23:31Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Malware Injection&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Malware Injection&#039;&#039; is when an attacker injects malicious code, or &#039;&#039;malware&#039;&#039;, into edge devices or servers and is classified as either server-side or device-side injections. &#039;&#039;Server-side injections&#039;&#039; are separated into four types: SQL, XSS, CSRF and SSRF, and XML. &#039;&#039;Device-side injection&#039;&#039; is when an attacker injects the malware directly into IoT devices since IoT devices are highly heterogeneous, so an attacker can physically inject or use third-party malicious libraries that are powerful and less likely to get detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SQL injection&#039;&#039; is a code injection technique that attackers can use in order to destroy back-end databases by using the SQL query and escape sequences to trick the server into thinking the code is valid. &#039;&#039;XSS injection&#039;&#039; is a client-side attack in which an attacker injects malicious code into data content, which can be accessed and executed automatically by the servers. &#039;&#039;CSRF injection&#039;&#039; is an attack in which an end user is forced to execute unwanted actions through Web applications. &#039;&#039;SSRF injection&#039;&#039; is an attack in which Edge servers are abused to read or alter the internal resources. &#039;&#039;XML injection&#039;&#039; is an attack which an attacker intercepts an XML message and edits with malicious code so that it is sent to the Edge servers using &#039;&#039;Simple Object Access Protocol&#039;&#039; (SOAP).&lt;br /&gt;
&lt;br /&gt;
[[File: SQLinjectionattack.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:Sidechannelattack.png&amp;diff=469</id>
		<title>File:Sidechannelattack.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:Sidechannelattack.png&amp;diff=469"/>
		<updated>2025-04-06T17:52:08Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=468</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=468"/>
		<updated>2025-04-06T17:51:48Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
[[File: sidechannelattack.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=449</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=449"/>
		<updated>2025-04-06T02:42:00Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Side-Channel Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes in order to measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=448</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=448"/>
		<updated>2025-04-06T02:41:09Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* Side-Channel Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Attacks exploiting communication channels&#039;&#039; are when an attacker can use a malicious node, that doesn&#039;t have to be an edge server or device, in order to exploit communication channels and uses the node to continuously sniff the network traces and wishes to extract sensitive information out of them. &#039;&#039;Attacks exploiting power consumption&#039;&#039; are when attackers use smart meters and oscilloscopes, they can measure the power consumption of a system since it carries information related to either the device that consumes the energy as different devices have different power. &#039;&#039;Attacks exploiting smartphone-based channels&#039;&#039; are when attackers exploit vulnerabilities using /proc and smartphone embedded sensors due to how sensors can leak information and send malware to the user that they can install but disguised as something important and attack /proc.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=447</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=447"/>
		<updated>2025-04-06T02:35:14Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Side-Channel Attacks&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Side-Channel Attacks&#039;&#039; happen when an attacker constantly obtains certain &#039;&#039;side-channel information&#039;&#039;, like using public information that is not privately-sensitive for a user, from the target edge computing infrastructure and then feeds it into specific algorithms or machine learning models that outputs the desired sensitive information. There are three kinds of Side-Channel attacks: attacks exploiting communication channels, attacks exploiting power consumption, and attacks exploiting smartphone-based channels.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:ZeroDayDDoS.png&amp;diff=446</id>
		<title>File:ZeroDayDDoS.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:ZeroDayDDoS.png&amp;diff=446"/>
		<updated>2025-04-06T02:26:18Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=445</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=445"/>
		<updated>2025-04-06T02:26:05Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target Edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built Edge servers could have &#039;&#039;code vulnerabilities&#039;&#039;, such as a hanging pointers or stack overflows, and an attacker can abuse those vulnerabilities in order to cause the Edge servers or devices to overload due to memory issues and shut down.&lt;br /&gt;
&lt;br /&gt;
[[File: ZeroDayDDoS.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=444</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=444"/>
		<updated>2025-04-06T02:17:30Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Zero-Day&#039;&#039; DDoS attacks are when an attacker must find an unknown vulnerability in a piece of code running on the target edge server or device, which can cause memory corruption and finally result in a service shutdown. For example, newly built edgh&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:UDPFLOODING.png&amp;diff=443</id>
		<title>File:UDPFLOODING.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:UDPFLOODING.png&amp;diff=443"/>
		<updated>2025-04-06T02:15:57Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=442</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=442"/>
		<updated>2025-04-06T02:15:46Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Flooding-based&#039;&#039; DDoS attacks are a type of of DDoS attacks aiming to shut down normal service of a server based on large amount of flooded malformed or malicious network packets and are mainly classified as UDP flooding, ICMP flooding, SYN flooding, ping of death (PoD), HTTP flooding, and Slowloris.&lt;br /&gt;
&lt;br /&gt;
[[File: UDPFLOODING.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=441</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=441"/>
		<updated>2025-04-06T02:13:39Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
Flooding&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=440</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=440"/>
		<updated>2025-04-06T02:13:08Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=439</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=439"/>
		<updated>2025-04-06T02:12:59Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:DDoS-Botnet.png&amp;diff=438</id>
		<title>File:DDoS-Botnet.png</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:DDoS-Botnet.png&amp;diff=438"/>
		<updated>2025-04-06T02:12:00Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=437</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=437"/>
		<updated>2025-04-06T02:11:51Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
[[File: DDoS-Botnet.png]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=File:Ddos-attack.jpg.webp&amp;diff=436</id>
		<title>File:Ddos-attack.jpg.webp</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=File:Ddos-attack.jpg.webp&amp;diff=436"/>
		<updated>2025-04-06T02:08:46Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=435</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=435"/>
		<updated>2025-04-06T02:08:26Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* DDoS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time. There are two kinds of DDoS attacks: Flooding-based and Zero-day DDoS attacks. &lt;br /&gt;
[[File: ddos-attack.jpg.webp]]&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=434</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=434"/>
		<updated>2025-04-06T01:59:05Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* DDoS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. &#039;&#039;DDoS attacks&#039;&#039; occur when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=433</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=433"/>
		<updated>2025-04-06T01:58:26Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
From previous chapters, Edge Computing has shown that it is here to stay and it will keep rapidly growing throughout the years. However, Edge Computing has its own security challenges that have to be addressed, because it is not a perfect system. Edge Computing has many security challenges that have to be dealt with in order to keep data safe.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;DDoS&#039;&#039;&#039;===&lt;br /&gt;
&#039;&#039;DDoS&#039;&#039; is a type of cyberattack in which an attacker aims to disrupt services provided by one or more servers based on distributed based on distributed resources such as a cluster of compromised Edge devices, which are also known as &#039;&#039;botnets&#039;&#039;. DDoS attacks &#039;&#039;occur&#039;&#039; when an attacker persistently sends streams of packets to a victim from compromised electronic devices, which causes the hardware resources of the victim to be quickly exhausted by handling these malicious packets and can no longer process any legitimate request on time.&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=432</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=432"/>
		<updated>2025-04-06T01:35:23Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.4 Case Studies: Real-World Security Breaches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==6.4 Case Studies: Real-World Security Breaches==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=431</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=431"/>
		<updated>2025-04-06T01:35:10Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.3 Security Protocols and Frameworks for Edge Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==6.3 Security Protocols and Frameworks for Edge Systems==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=430</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=430"/>
		<updated>2025-04-06T01:34:51Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.2 Data Privacy and Compliance in Edge Applications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==6.2 Data Privacy and Compliance in Edge Applications==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.3 Security Protocols and Frameworks for Edge Systems&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=429</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=429"/>
		<updated>2025-04-06T01:34:40Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6.1 Overview of Security Challenges in Edge Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==6.1 Overview of Security Challenges in Edge Computing==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.2 Data Privacy and Compliance in Edge Applications&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.3 Security Protocols and Frameworks for Edge Systems&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=428</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=428"/>
		<updated>2025-04-06T01:34:04Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* 6. Edge Security and Privacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==6. Edge Security and Privacy==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.1 Overview of Security Challenges in Edge Computing&#039;&#039;&#039;==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.2 Data Privacy and Compliance in Edge Applications&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.3 Security Protocols and Frameworks for Edge Systems&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Main_Page&amp;diff=427</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Main_Page&amp;diff=427"/>
		<updated>2025-04-06T01:32:45Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;color: red;&amp;quot;&amp;gt; Please note that: &amp;lt;/span&amp;gt;&lt;br /&gt;
* you can only create or edit a page when you are on campus or connected to the UM VPN. &lt;br /&gt;
* read this help page for formatting:  [https://www.mediawiki.org/wiki/Help:Formatting Formatting]&lt;br /&gt;
* read this help page for user&#039;s guide: [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;br /&gt;
&lt;br /&gt;
== Structure of this WiKi ==&lt;br /&gt;
&lt;br /&gt;
1. [http://www.edgecomputingbook.com/index.php/Edge_Cloud:_Bringing_Computing_Close_to_the_User Edge Cloud Demo] - Sample &lt;br /&gt;
&lt;br /&gt;
2. [http://www.edgecomputingbook.com/index.php/Chapter_1:_Edge_Computing Edge Computing Chapter 1] -  Reference Sample&lt;br /&gt;
&lt;br /&gt;
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)&lt;br /&gt;
&lt;br /&gt;
1.1 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.1_What_is_Edge_Computing? What is Edge Computing?]&lt;br /&gt;
&lt;br /&gt;
1.2 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.2_Why_we_need_Edge_Computing? Why We Need Edge Computing?]&lt;br /&gt;
&lt;br /&gt;
1.3 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.3_Edge_Computing_application_Domains_and_Typical_Applications Edge Computing Application Domains and Typical Applications]&lt;br /&gt;
&lt;br /&gt;
1.4 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.4_Different_Edge_Computing_Paradigms Different Edge Computing Paradigms ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)] &lt;br /&gt;
&lt;br /&gt;
2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins]&lt;br /&gt;
&lt;br /&gt;
2.2 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.2_Cloud Cloud]&lt;br /&gt;
&lt;br /&gt;
2.3 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.3_Edge_and_Fog Edge and Fog]  &lt;br /&gt;
&lt;br /&gt;
2.4 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.4_Edge-Cloud_Continuum Edge-Cloud Continuum]   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)] &lt;br /&gt;
&lt;br /&gt;
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example]&lt;br /&gt;
&lt;br /&gt;
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks]&lt;br /&gt;
&lt;br /&gt;
3.3 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.3_Serverless_at_the_Edge Serverless at the Edge]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.[http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge Machine Learning at the Edge] (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)&lt;br /&gt;
&lt;br /&gt;
4.1 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.1_Overview_of_ML_at_the_Edge Overview of ML at the Edge]&lt;br /&gt;
&lt;br /&gt;
4.2 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.2_ML_Training_at_the_edge ML Training at the Edge]&lt;br /&gt;
&lt;br /&gt;
4.3 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.3_ML_Model_Optimization_at_the_Edge ML Model Optimization at the Edge]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)&lt;br /&gt;
&lt;br /&gt;
6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing]&lt;br /&gt;
&lt;br /&gt;
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications]&lt;br /&gt;
&lt;br /&gt;
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems]&lt;br /&gt;
&lt;br /&gt;
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)]&lt;br /&gt;
&lt;br /&gt;
7.1  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling]&lt;br /&gt;
&lt;br /&gt;
7.2  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.2_Edge_for_AR/VR Edge for AR/VR]&lt;br /&gt;
&lt;br /&gt;
7.3  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.3_Vehicle_Computing Vehicle Computing]&lt;br /&gt;
&lt;br /&gt;
7.4 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.4_Energy-Efficient_Edge_Architectures Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)]&lt;br /&gt;
&lt;br /&gt;
7.5 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.5_Data_Persistence Data Persistence (Warren Lazarraga)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing Applications of Edge Computing: Underwater Internet of Things (UIoT)]&lt;br /&gt;
&lt;br /&gt;
8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs]&lt;br /&gt;
&lt;br /&gt;
8.2 Edge Computing for AUVs: Benefits and Necessity&lt;br /&gt;
&lt;br /&gt;
8.3 Key Challenges in Applying Edge Computing to AUVs&lt;br /&gt;
&lt;br /&gt;
8.4 State-of-the-Art Edge Computing Solutions&lt;br /&gt;
&lt;br /&gt;
8.5 Future Research Directions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9.Conclusion and Future Outlook (cannot be chosen by students)&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=426</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=426"/>
		<updated>2025-04-06T01:30:15Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* yes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==&#039;&#039;&#039;6. Edge Security and Privacy&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.1 Overview of Security Challenges in Edge Computing&#039;&#039;&#039;==&lt;br /&gt;
===&#039;&#039;&#039;yes&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.2 Data Privacy and Compliance in Edge Applications&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.3 Security Protocols and Frameworks for Edge Systems&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
	<entry>
		<id>http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=425</id>
		<title>Chapter 6: Edge Security and Privacy</title>
		<link rel="alternate" type="text/html" href="http://www.edgecomputingbook.com/index.php?title=Chapter_6:_Edge_Security_and_Privacy&amp;diff=425"/>
		<updated>2025-04-06T01:29:56Z</updated>

		<summary type="html">&lt;p&gt;Ali Siddiqi: /* yes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==&#039;&#039;&#039;6. Edge Security and Privacy&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.1 Overview of Security Challenges in Edge Computing&#039;&#039;&#039;==&lt;br /&gt;
==&#039;&#039;&#039;yes&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.2 Data Privacy and Compliance in Edge Applications&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.3 Security Protocols and Frameworks for Edge Systems&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;6.4 Case Studies: Real-World Security Breaches&#039;&#039;&#039;==&lt;/div&gt;</summary>
		<author><name>Ali Siddiqi</name></author>
	</entry>
</feed>