How Edge Computing Transforms IoT and Strengthens Security
By Bill Dykas
September 2, 2025
By Bill Dykas
September 2, 2025
Estimated reading time: 9 minutes
Internet of Things (IoT) networks range in size from a few devices to thousands of devices. Scaled systems must transmit a massive amount of raw data. When vectored unprocessed to a cloud server or from a central database to a device network, IoT traffic can:
Edge computing creates a processing perimeter at the network edge. Logic and analysis are performed in real time before data exchange with core systems.
IBM defines edge computing as “a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers.”
Processing at the edge reduces traffic sent to and from devices. It can reduce data exchange times in critical applications, such as condition-based monitoring or manufacturing.
Edge computing increases the security of a local network. However, it is subject to security vulnerabilities related to remote access and management issues.
As the number of IoT devices continues to increase, organizations must address these known issues.
Edge computing solves several data traffic issues in IoT networking. However, it also presents new vulnerabilities, resulting in a larger overall attack surface (i.e., the sum of a system’s access points a potential attacker can leverage).
The state of current platforms makes networks more vulnerable at the edge and the user endpoint. Many attacks can occur because end users do not or cannot change default passwords. Without this ability, bad actors can access and expose edge devices to potential attacks.
Unsecured internet resources are easy to find and access. For example, default passwords on devices may come with a security warning. When hard-coded by manufacturers and left unchanged, they become a well-publicized entry source for cybercriminals.
These attacks are vulnerable at the endpoint. Edge computing introduces potential attack surfaces, which complicate matters. IoT devices that connect to the public internet compromise security protocols at the edge. In the current state of edge computing, full-stack solutions that include secure elements in sensors and software are rare.
Many methods used to secure IoT networks at the edge are insufficient. Compromised encryption keys make LPWAN protocols vulnerable. VPNs are subject to man-in-the-middle attacks.
The IoT is distributed and fragmented with a vast attack surface. A lack of physical security creates severe security risks for your entire IoT ecosystem. That’s because the distributed nature of edge computing also opens an unwelcome frontier of physical threats.
Traditional networks’ servers and devices are often housed in dedicated, highly secure facilities. The small data centers that enable edge processing can pose significant security risks.
Instead of living in data centers, these microcenter devices are often deployed in the field. With the IoT edge, the field can be a corporate office, farm or anything in between.
An attacker physically tampering with an edge device can bring down a network or even harm one of its operators. A physical hack at any point in the system may be the start of deep infiltration. Subsequent hacks can be applied remotely and impact thousands of devices.
Securing these devices is far from trivial. It is necessary to harden them against physical attacks. However, there is a trade-off between security, cost and the ease of upgrading and servicing edge data centers. Device makers must consider risks and ensure devices are secured to generate remote and local alarms in the event of tampering.
Those unfamiliar with the shifting IoT cybersecurity landscape pose the biggest threat to IoT edge networks. They include:
Human error is a chief cause of cybersecurity breaches. Many organizations strive to mitigate this risk. However, mitigation challenges increase as business personnel and operations become more geographically diverse.
IoT devices outside corporate and industrial sites are often considered toys rather than serious security risks. Many ordinary users may not follow security procedures.
If attackers gain physical access, they can compromise the devices and disrupt business operations. They can also gain access to internal networks and sensitive company information. To impede hackers, physically secure devices and protect them with strong passwords and regular updates.
Artificial intelligence (AI) is at the forefront of edge computing capabilities. After model training, organizations can infer directly at the edge. That powers applications like visual inspection without the need for constant cloud connectivity.
The sophistication of edge AI applications introduces complexity. For example, visual inspection systems often require the coordination of multiple camera angles. They may also need to tie results to specific products.
This creates new challenges around model management and updates across edge devices. Organizations must determine if AI implementation adds value.
Zero-trust architecture is a standard in IoT implementations. Organizations incorporate zero-trust requirements into RFIs and technical evaluations.
The National Institute of Standards and Technology defines the principles of this concept as follows:
Organizations face complex data privacy and ownership requirements, particularly in regions like the EU. The EU Data Act empowers individuals to have greater control over data generated by connected devices. Users can authorize the transfer of their data between platforms and download complete copies of it.
Security protocols continue to advance, requiring organizations to plan for ongoing updates. For example, TLS 1.1 is no longer considered secure, and device fleets must upgrade to TLS 1.2. This highlights the importance of having mechanisms in place for security updates from the first day of deployment.
With secure devices and proper authentication systems, edge processing safely manages IoT data traffic. The Institute of Electrical and Electronics Engineers (IEEE) states that edge computing can address security issues for devices with resource limitations. Edge software can verify the identity of IoT devices and prevent malicious devices from accessing the core network.
To take advantage of the benefits of IoT devices and the edge, you must know how to keep your data secure. Ensure security at the edge of the network through:
This mechanism protects sensitive data at rest and in transit. Only the sender and receiver know the encryption key; third parties can’t read it.
This security method is essential for IoT devices because network breaches are a matter of when, not if. IoT leaves organizations more vulnerable because it increases the number of endpoints.
Organizations must plan to manage device updates and security patches from the outset. This includes having mechanisms in place to deploy updates across large device fleets. They also need strategies to handle aging hardware that may not support newer security protocols.
Technology constantly evolves. You can’t predict each change, but you can prepare for it. Consider how you will use your IoT devices in the future and if compatibility issues could compromise security.
IoT devices with a simple or common password are an open door for hackers. As IoT expands into every aspect of our lives (e.g., the home and workplace), all options and extra security layers should be implemented.
Each device should have a complex and unique password. Store encryption keys in a hardware token device that is not connected to the internet. If a biometric authentication system makes sense for your application, consider incorporating it to further secure your data.
Devices connected to the edge should not run unnecessary services. Minimize or eliminate connections to the public internet where possible. Establish protected communication channels between devices.
All devices should communicate securely with their environment. IoT devices should only send data relevant to their intended purpose. Devices should not be able to interact with other devices in any way, unless specifically designed to do so.
Organizations should partner with a provider who offers a comprehensive edge buildout solution. Edge computing solutions require more than suitable devices and software analysis tools. They also need physical security and controlled environments.
Companies that partner with experts will better overcome complex security challenges and benefit from streamlined edge processing. As a global leader in IoT solutions, Telit Cinterion helps your enterprise evolve and thrive with cutting-edge technology.
The deviceWISE® platform, powered by Telit Cinterion, empowers you to integrate your edge logic to third-party analytics tools and cloud applications. These edge capabilities give you the flexibility to control how you send and receive data from your deployment. With remote device management tools, you can ensure your security remains up to date.
Editor’s note: This blog was originally published on 6 January 2020 and has since been updated.