As we have learned from the whitepaper 'Edge Computing in Industrial Environment' about the overview and different forms of Edge computing, we will discuss more on various Edge computing security risks and their solutions.
Edge computing in IIoT satisfies the real-time needs for lightweight intelligent manufacturing whilst also increasing network agility and security. Cyberattacks compromise the confidentiality, integrity, or availability of data, as well as to disrupt a company's activities. Vulnerable network appliances, such as edge devices, continue to be one of the most effective attacks. They are a frequent target for attackers wishing to get inside, due to their position and functions which provide interconnectivity between different networks with the transmission, monitoring, filtering, translating, or storing of the data that passes from one network to another. Once a threat actor gains access to an edge device, they can launch attacks that can cause operational downtime, data theft, financial loss, and reputational damage.
The ‘security category’ comprises of wireless network security challenges, authentication and trust challenges, access control, and intrusion detection. Edge computing takes advantage of several different technologies to build the network, introducing potential to several attacks, such as man-in-the- middle, distributed denial of service (DDoS), side-channel attacks, device hijacking, malware injection attacks, authentication / authorization attacks and permanent denial of service (PDoS). A DoS (Denial of service) attack, is when a compromised system attempts to flood a resource to purposefully overload it, and a Distributed DoS or DDOS is when multiple compromised systems are orchestrated to do the same. Whenever a malicious packet is identified, it will be dropped before reaching its target.
There are four main categories of edge devices that help connect and secure enterprise or service provider networks. They are - Network edge devices (routers, switches, wide area network devices, VPN concentrators), Network security devices (firewalls), Network monitoring devices (network based intrusion detection systems) and Customer premise devices (integrated access devices). The system vulnerabilities are determined by the system's security layers and security techniques. The table below shows the four security levels of the IoT information system paradigm as well as the security measures used. The most susceptible layer is network security, whereas data security is the most secure.
Table: Security Layers and security methods
| No. | Security layers | Security methods |
|---|
|
1 |
Network security |
Authorization monitoring, egress filtering, network firewall, routing protocols security |
|
2 |
Device security |
Authentication control, patch management, tamper proofing, intrusion detection system |
|
3 |
Application security |
Application firewall, software development life cycle security, biometric authentication |
|
4 |
Data security |
Access control, cryptographic algorithms, data encryption, routing protocol security |
Security issues exist on edge devices, whether they are managed by end users or administrators. Moving data processing closer to the network edge has security implications. A few of the Edge Computing Security Risk are - Malicious Hardware/Software Injections, Physical Tampering & Attacks, Routing Information Attacks, Data storage, backup and protection risks, Password and authentication risks, Perimeter defense risks, Cloud adoption risks.
Security-as-a-Service (SECaaS) at the Network Edge
The deployment of security instances in remote data centers has several drawbacks, in order to overcome these issues, Edge Computing offers the opportunity to efficiently host services at the network edge, and provides remarkable benefits in terms of shortening latency and traffic reduction. As shown in below figure the Security-as-a-Service in industrial edge scenarios, the provisioning of on-demand security services according to the SECaaS model is gaining notable attention from both industrial and research communities. On the other hand, the limited capabilities of an edge node introduces potential constraints in the overall management.
Figure: Security-as-a-Service in industrial edge scenarios