By: Vanna karthik; Vel Tech University, Chennai, India
Abstract
Edge computing operates as a groundbreaking technology which positions data processing near sources to minimize response time and enable quicker decision-making when it occurs in real time. Rapid edge computing implementation has introduced major cybersecurity issues to the market. As the number of connected devices keeps increasing the attack surface area grows which leads to enhanced vulnerability for computer networks. The paper investigates edge computing and cybersecurity communication points by reviewing present security methods and future sustainability options for edge infrastructure protection.
Introduction
The current digital transformation age drives businesses to require faster and more efficient computing methods. The network edge processing capability of edge computing solves the demand for faster data operations which traditional cloud computing does not provide. The seamless operations of healthcare, autonomous vehicles as well as IOT applications depend on edge computing as their primary computing method[1]. The dispersal of data processing operations creates distinct cybersecurity problems which are not properly addressed using traditional security methods. This research discusses edge computing security perils while analyzing past academic works regarding information security and proposing edge environment protection techniques and examining forthcoming security improvements.
The Growing Popularity of Edge Computing
The acceptance of edge computing dynamics continues to increase throughout the healthcare sector and manufacturing industry and in both smart city development and autonomous vehicle application spaces. When organizations run data processing applications at their local sites, they gain improved bandwidth performance together with reduced processing delays and better user interactions[2]. Security arrangements for edge computing platforms face added complexities because of their distributed design approach when compared to centralized information systems.
Literature Review
Research into edge computing security keeps growing since more organizations depend on this computing model. Research studies demonstrate various security challenges which involve data breach along with Distributed Denial of Service and standardization issues[3]. Edge node systems remain defenseless because they possess deficient processing capability and lack proper protection measures according to research studies[4]. Existent research demonstrates how edge security can get an upgrade through security systems powered by artificial intelligence (AI) in addition to blockchain technology and zero-trust frameworks[5]. These methods demonstrate potential for solving security problems, but experts agree their actual deployment needs more investigation into development and research.
Security Threat | Impact | Mitigation Strategy |
Unauthorized Access | Data theft, Privacy Violation | Multi Factor Authentication (MFA), Access Policy. |
Data Branches Malware injection | Compromised Device | Regular security updates, Ai based threat detection. |
DoS Attack | Service Disruption | Instruction Detection System(IDS), traffic Monitoring. |
Data Branches | Loss of Confidential Information | End-to-End Encryption, Secure Policy |
Table : Security threats, Impacts and Mitigation Strategies for edge Computing
Cybersecurity Challenges in Edge Computing
Edge computing provides multiple benefits to users through its distributed computing framework but also faces some challenges as follows:
Expanded Attack Surface
All devices located on the edge function as access points which risk unauthorized cyber entry. The distributed security control model of traditional cloud environments cannot protect edge devices operating in various locations because these devices frequently operate in unprotected conditions that expose them to attacks[6].
Data Breaches and Privacy Concerns
Data processing operations at the edge introduce additional risks to sensitive information including personal and financial and medical records which can be intercepted or compromised. When encryption programs are weak, or access controls improperly implemented data breaches become more likely to occur[7].
Lack of Standardized Security Protocols
The security frameworks developed for cloud computing systems do not exist to the same degree in edge computing approaches. Organizations encounter difficulties when they try to establish a unified security plan because diverse edge devices and operational settings have differing standards[6].
IoT Device Vulnerabilities
Edge devices make up many IoT devices which have restricted processing abilities in addition to weak security features. Thankfully malware programs and botnets together with DDoS attacks attack these devices due to their fundamental security weaknesses. The Mirai botnet attack demonstrated weak IoT security because the perpetrators exploited unprotected devices to create their network[7].
Methodology
The following method helps to improve Edge computing cybersecurity:
Security Risk Assessment identifies all operational vulnerabilities present in edge devices and networks.
Security Framework Implementation: Deploying encryption, authentication, and secure communication protocols.
Real-time security threat detection occurs through machine learning models which are known as AI-Powered Anomaly Detection.
Decentralized ledgers through Blockchain ensure both data authenticity and stop data tampering making it possible for businesses to implement data integrity solutions.
Security operations centers known as SOCs should function as a continuous monitoring system to detect threats followed by immediate response action.

Flowchart : Security Framework for Edge Computing
Future of Cybersecurity in Edge Computing
Edge computing evolves in real-time which demands organizations to evolve their cybersecurity approaches. Current edge security solutions containing blockchain security systems and decentralized identity controllers show potential to improve edge systems protection. Security requirements must be integrated during the design phase and deployment stage of edge infrastructure by organizations to remain proactive.
Conclusion
Edge computing provides performance and efficiency benefits while institutions must deal with their associated cybersecurity vulnerabilities. The security risks grow in direct relation to the expanding number of connected devices. Organization requires implementation security measures through AI-threat detection alongside blockchain-based data authentication systems and continuous tracking mechanisms. A cybersecurity framework that is properly developed can enable businesses to use edge computing technology while protecting them from cyber-attacks. Studies in the future need to develop security systems that adjust to new security threats emerging within edge computing environments.
References
- A. Biswas and H.-C. Wang, “Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain,” Sensors, vol. 23, no. 4, Art. no. 4, Jan. 2023, doi: 10.3390/s23041963.
- G. Nain, K. K. Pattanaik, and G. K. Sharma, “Towards edge computing in intelligent manufacturing: Past, present and future,” J. Manuf. Syst., vol. 62, pp. 588–611, Jan. 2022, doi: 10.1016/j.jmsy.2022.01.010.
- S. Myneni, A. Chowdhary, D. Huang, and A. Alshamrani, “SmartDefense: A distributed deep defense against DDoS attacks with edge computing,” Comput. Netw., vol. 209, p. 108874, May 2022, doi: 10.1016/j.comnet.2022.108874.
- G. Carvalho, B. Cabral, V. Pereira, and J. Bernardino, “Edge computing: current trends, research challenges and future directions,” Computing, vol. 103, no. 5, pp. 993–1023, May 2021, doi: 10.1007/s00607-020-00896-5.
- Washima Tuleun, “Analysis of cybercrimes, major cyber security attacks and the overall economic impact on Nigeria,” World J. Adv. Res. Rev., vol. 16, no. 1, pp. 1196–1221, Oct. 2022, doi: 10.30574/wjarr.2022.16.1.1113.
- S. K. Venkatachary, A. Alagappan, and L. J. B. Andrews, “Cybersecurity challenges in energy sector (virtual power plants) – can edge computing principles be applied to enhance security?,” Energy Inform., vol. 4, no. 1, p. 5, Mar. 2021, doi: 10.1186/s42162-021-00139-7.
- D. Kolevski and K. Michael, “Edge Computing and IoT Data Breaches: Security, Privacy, Trust, and Regulation,” IEEE Technol. Soc. Mag., vol. 43, no. 1, pp. 22–32, Mar. 2024, doi: 10.1109/MTS.2024.3372605.
- Rahaman, M., Arya, V., Orozco, S. M., & Pappachan, P. (2024). Secure Multi-Party Computation (SMPC) protocols and privacy. In Advances in information security, privacy, and ethics book series (pp. 190–214). https://doi.org/10.4018/979-8-3693-5330-1.ch008
- Rahaman, M., Lin, C., Pappachan, P., Gupta, B. B., & Hsu, C. (2024). Privacy-Centric AI and IoT solutions for smart rural farm monitoring and control. Sensors, 24(13), 4157.
- Al-Ayyoub, M., AlZu’bi, S., Jararweh, Y., Shehab, M. A., & Gupta, B. B. (2018). Accelerating 3D medical volume segmentation using GPUs. Multimedia Tools and Applications, 77, 4939-4958.
- Gupta, S., & Gupta, B. B. (2018). XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimedia Tools and Applications, 77, 4829-4861.
- Katiyar A. (2024) Enhancing Cloud Computing Security Through Quantum-Inspired Evolutionary Approaches, Insights2Techinfo, pp.1
Cite As
Karthik V. (2025) Edge Computing and Cybersecurity : More Devices, More Risks?, Insights2techinfo pp.1