Research Article

The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence

Table 1

The sources of security risks in the five fields for edge computing.

Variety of risksTerminal assets are quite limitedTerminals with a variety of protocols for communicationEngineering for a new organizationAssets in the edge hub that are restrictedActual insurance of edge hubs is insufficientEdge hubs have a strong environmental effect

Controlling accessAvailableAvailableAvailableAvailableAvailable
Management personnelAvailableAvailableAvailable
Protection against security threatsAvailableAvailableAvailable
Mitigation of assaultAvailableAvailableAvailableAvailableAvailable
Oddity detectionAvailableAvailable