Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  A description of edge computing-based design in the domain of information technology for Internet of Things security.
PaperId: :  26551
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 11 Issue 3 2025
DUI:    16.0415/IJARIIE-26551
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Debayan PaulMaulana Abul Kalam Azad University of Technology (Main Campus)

Abstract

Technology
Internet of Things (IoT), edge computing, data privacy, security, and real-time threat detection.
Significant security issues have been brought about by the growth of Internet of Things (IOT) devices, such as heightened susceptibility to data breaches and cyberattacks. Edge computing is a viable way to improve IoT security by processing data closest to the source. Using edge computing's advantages to lower latency, enhance data privacy, and improve real-time detection of risks, this article outlines an edge computing-based approach for IoT security. Our system adds an extra layer of protection, speeds up anomaly detection, and minimizes the quantity of data sent to central servers or the cloud by performing data processing at the edge. The architecture, advantages, and possible uses of this concept are discussed, with an emphasis on how it may raise the effectiveness and security of IoT systems. Pervasive Internet of Things applications allow us to see, evaluate, manage, and improve conventional physical systems. Several security lapses in several IoT applications have suggested that IoT applications might endanger physical systems. Inadequate security architecture and severe resource limitations are two main reasons why many IoT apps have security issues. We have a new space to develop and implement innovative security solutions for Internet of Things applications thanks to the burgeoning edge computing, which is a subsidiary of the cloud and has abundant resources. IoT applications using edge-based security architectures are still in their infancy, despite some academic efforts in this field. The objective of this article is to provide an extensive overview of current edge-layer IoT security solutions and to stimulate further edge-based IoT security architectures. We begin by introducing an edge-centric Internet of Things architecture. After that, we thoroughly examine the research being done on edge-based IoT security in relation to intrusion detection systems, firewalls, security architectural designs, authorization and identification protocols, and privacy-preserving techniques. Lastly, we offer our perspective on outstanding research questions and potential study avenues.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Debayan Paul. "A description of edge computing-based design in the domain of information technology for Internet of Things security." International Journal Of Advance Research And Innovative Ideas In Education Volume 11 Issue 3 2025 Page 927-932
MLA Debayan Paul. "A description of edge computing-based design in the domain of information technology for Internet of Things security.." International Journal Of Advance Research And Innovative Ideas In Education 11.3(2025) : 927-932.
APA Debayan Paul. (2025). A description of edge computing-based design in the domain of information technology for Internet of Things security.. International Journal Of Advance Research And Innovative Ideas In Education, 11(3), 927-932.
Chicago Debayan Paul. "A description of edge computing-based design in the domain of information technology for Internet of Things security.." International Journal Of Advance Research And Innovative Ideas In Education 11, no. 3 (2025) : 927-932.
Oxford Debayan Paul. 'A description of edge computing-based design in the domain of information technology for Internet of Things security.', International Journal Of Advance Research And Innovative Ideas In Education, vol. 11, no. 3, 2025, p. 927-932. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/A_description_of_edge_computing_based_design_in_the_domain_of_information_technology_for_Internet_of_Things_security__ijariie26551.pdf (Accessed : ).
Harvard Debayan Paul. (2025) 'A description of edge computing-based design in the domain of information technology for Internet of Things security.', International Journal Of Advance Research And Innovative Ideas In Education, 11(3), pp. 927-932IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/A_description_of_edge_computing_based_design_in_the_domain_of_information_technology_for_Internet_of_Things_security__ijariie26551.pdf (Accessed : )
IEEE Debayan Paul, "A description of edge computing-based design in the domain of information technology for Internet of Things security.," International Journal Of Advance Research And Innovative Ideas In Education, vol. 11, no. 3, pp. 927-932, May-Jun 2025. [Online]. Available: http://ijariie.com/AdminUploadPdf/A_description_of_edge_computing_based_design_in_the_domain_of_information_technology_for_Internet_of_Things_security__ijariie26551.pdf [Accessed : ].
Turabian Debayan Paul. "A description of edge computing-based design in the domain of information technology for Internet of Things security.." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 11 number 3 ().
Vancouver Debayan Paul. A description of edge computing-based design in the domain of information technology for Internet of Things security.. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2025 [Cited : ]; 11(3) : 927-932. Available from: http://ijariie.com/AdminUploadPdf/A_description_of_edge_computing_based_design_in_the_domain_of_information_technology_for_Internet_of_Things_security__ijariie26551.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
The latest technology to use Radar prototype System for Target Detection and TrackingTechnologyKartik Prasad Download
A description of edge computing-based design in the domain of information technology for Internet of Things security.TechnologyDebayan Paul Download
OPTIMIZATION OF THE BIG DATA SECURITY BASED ON THE COMBINATION OF IMPROVED ATTRIBUTE ENCRYPTION AND THE BLOCKCHAIN.Science of engineeringRAVELOJAONA Andriantsitoherintsoa, Download
Effective Transmission Capacity Management Technique Using Z-Score Outlier Normalization AlgorithmTelecommunication EngineeringLutfor Rahman Download
IMPLEMENTATION OF WOMEN SAFETY SYSTEM BASED ON EMBEDDED SYSTEM WITH FINAL RESULTE & TC EngineeringAGRAWAL NISHA AJAY Download
Ultrametric hierarchical resource utilization model using p-adic numbersComputer Engineering, cognitive science, telecommunication, mathematicalToky Basilide RAVALIMINOARIMALALASON Download
A multimodality method for human activity recognition based on Multi-Stage Temporal Convolutional NetworkComputer EngineeringThu Dao Thi Download
Power consumption reduction on RADAR MIMO using Lift Wavelet Transform – Orthogonal Frequency Division Multiplexing (LWT-OFDM)TELECOMMUNICATIONRANDRIANANDRASANA Marie Emile Download
3D estimation of Direction of Arrival using Uniform Phased Array Antenna on multi-targeting FMCW RADARTELECOMMUNICATIONRANDRIANANDRASANA Marie Emile Download
RADAR CROSS SECTION ( RCS )TELECOMMUNICATIONRANDRIANANDRASANA Marie Emile Download
PERFORMANCE OF MIMO RADAR AND PHASED ARRAY RADARTelecommunication EngineeringANDRIAMANALINA Ando Nirina Download
PERFORMANCE OF SPACE TIME BLOCK CODE OVER MIMO CHANNELTelecommunication EngineeringANDRIAMANALINA Ando Nirina Download
SPATIAL MULTIPLEXING WITH SUCCESSIVE INTERFERENCE CANCELLATIONTelecommunication EngineeringANDRIAMANALINA Ando Nirina Download
PERFORMANCE OF FIXED BEAMFORMINGTelecommunication EngineeringANDRIAMANALINA Ando Nirina Download
COLOCATED MIMO RADAR: BEAMFORMING TRANSMISSION, WAVEFORM MODELING, TARGET PARAMETER ESTIMATIONTELECOMMUNICATIONRANDRIANANDRASANA Marie Emile Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.