| Abstract |
While edge computing has revolutionized where we process data, a shift away from the traditional cloudbased model results in an entirely new set of security challenges. Constant verification is a key feature of Zero Trust, but this approach is not optimal in decentralized edge settings, especially given the high latency demands of edge environments. In this chapter, we introduce real- time access control and monitoring as a solution for edge- embedded applications as it is quite dynamic. In comparison to static models, the real- time access control identifies and dynamically adapt according to user behaviour, location of the device and status of networks, thereby enabling edge devices to take actions independently to the threats. We examine innovations-low- latency detection, behavioral analytics, and dynamic policies-that drive edge security, through examples in IoT, healthcare, and smart cities. New developments like predictive access models and quantum- safe encryption are raising the bar for adaptive, resilient edge protection. © 2025, IGI Global Scientific Publishing. All rights reserved. |