Securing mobile edge computing: A survey on cyber-physical threat mitigation for digital sovereignty
Tochukwu, Ikwuazom Callistus; Nonyelum, Ogwueleka Francisca; Misra, Sanjay; Chockalingam, Sabarathinam
Peer reviewed, Journal article
Published version
Date
2025Metadata
Show full item recordCollections
Abstract
Mobile Edge Computing (MEC) enhances network efficiency by decentralizing resources closer to users, but it also introduces significant cybersecurity challenges, such as DDoS attacks, unauthorized access and data breaches. The effects of these potent attacks negate the principles of digital sovereignty. Securing MEC is crucial not only for system efficiency but also for ensuring digital sovereignty by safeguarding critical infrastructures and sensitive data from external entities. Nations and industries must safeguard sensitive data, defend against these evolving threats, and retain autonomous control over their digital ecosystem. In this study, considering various applicability of ML-based models, blockchain, and encryption techniques as cybersecurity strategies to combat cyber physical threats within MEC environments, it offers a systematic review of recent strategies from studies with 3 years. Although these methods are promising, scalability and practical applicability are hard to come by, especially in resource constrained settings. Our findings can help to develop secure, resilient MEC systems which can protect digital infrastructures, ensuring privacy, autonomy, and trust which are essential to maintaining digital sovereignty. This work offers valuable insights for future research to develop adaptable and robust solutions that ensure secure, decentralized systems, reinforcing the principles of digital sovereignty. Securing mobile edge computing: A survey on cyber-physical threat mitigation for digital sovereignty