Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment

被引:0
|
作者
Mansour, Marvy Badr Monir [1 ]
机构
[1] British Univ Egypt, Elect Engn Dept, Comp Engn, Cairo, Egypt
关键词
Fuzzy Logic; Internet of Things; Location-based Service Providers; Misbehavior Detection; Multi-Access Edge Computing; Penalty System; SECURITY; RSA;
D O I
10.1016/j.jksuci.2023.101690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, an emerging paradigm of edge computing, called Multi-Access Edge Computing (MEC), is widely used in a broad range of applications. MEC has been recently used as a driving technology for 5G net-works. However, MEC encompasses some security problems, such as communicating with untrusted third-party service providers commonly known as location-based service (LBS) providers. In this paper, we propose a novel fuzzy-based misbehavior detection system for Internet of Things (IoT) in a 5G-based MEC environment to solve the previous problems. Our proposed system is comprised of a multi-tier architecture that is linked by IoT gateways and mobile core network. In our architecture, we employ a novel mechanism that embeds a security entity called Regional Certificate Authority in a 5G macro base station. This security entity acts as a passport for the IoT gateway to communicate with other security entities present in our system that are located in the core infrastructure. Besides that, our system utilizes a distributed certificate revocation mechanism for malicious LBS providers via simultaneously updating the internal blocklists employed by more than one system entity. In addition, we adopt in our architec-ture a novel penalty system for malicious LBS providers, which is used for penalizing providers in case proved to be malicious as well as actively isolating them from the network. On the other hand, our system provides conditional anonymity for the incident's reporter. Also, we present various security features maintained by the proposed system to thwart well-known attacks as well as we demonstrate efficiency and robustness of our system. Finally, we provide the overhead of our system and compare it with other state-of-the-art approaches where results show that the proposed system relatively incurs the least overhead.& COPY; 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Trust Assessment for Internet of Things in Multi-access Edge Computing
    Ruan, Yefeng
    Durresi, Arjan
    Uslu, Suleyman
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 1155 - 1161
  • [2] Survey on Multi-Access Edge Computing for Internet of Things Realization
    Porambage, Pawani
    Okwuibe, Jude
    Liyanage, Madhusanka
    Ylianttila, Mika
    Taleb, Tarik
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2961 - 2991
  • [3] Reputation Based Attacker Identification Policy for Multi-Access Edge Computing in Internet of Things
    Sandal, Yagmur Sabucu
    Pusane, Ali Emre
    Kurt, Gunes Karabulut
    Benedetto, Francesco
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15346 - 15356
  • [4] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Mimoza Durresi
    Anisa Subashi
    Arjan Durresi
    Leonard Barolli
    Kazunori Uchida
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1631 - 1640
  • [5] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Durresi, Mimoza
    Subashi, Anisa
    Durresi, Arjan
    Barolli, Leonard
    Uchida, Kazunori
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) : 1631 - 1640
  • [6] Multi-access edge computing enabled internet of things: advances and novel applications
    Zhu, Rongbo
    Liu, Lu
    Song, Houbing
    Ma, Maode
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (19): : 15313 - 15316
  • [7] Multi-access edge computing aided mobility for privacy protection in Internet of Things
    Zhang, Ping
    Durresi, Mimoza
    Durresi, Arjan
    [J]. COMPUTING, 2019, 101 (07) : 729 - 742
  • [8] A comprehensive review on internet of things task offloading in multi-access edge computing
    Dayong, Wang
    Abu Bakar, Kamalrulnizam Bin
    Isyaku, Babangida
    Eisa, Taiseer Abdalla Elfadil
    Abdelmaboud, Abdelzahir
    [J]. HELIYON, 2024, 10 (09)
  • [9] Balanced multi-access edge computing offloading strategy in the Internet of things scenario
    Ye, Dan
    Wang, Xiaogang
    Hou, Jin
    [J]. COMPUTER COMMUNICATIONS, 2022, 194 : 399 - 410
  • [10] Multi-access edge computing enabled internet of things: advances and novel applications
    Rongbo Zhu
    Lu Liu
    Houbing Song
    Maode Ma
    [J]. Neural Computing and Applications, 2020, 32 : 15313 - 15316