Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment

被引:0
|
作者
Mansour, Marvy Badr Monir [1 ]
机构
[1] British Univ Egypt, Elect Engn Dept, Comp Engn, Cairo, Egypt
关键词
Fuzzy Logic; Internet of Things; Location-based Service Providers; Misbehavior Detection; Multi-Access Edge Computing; Penalty System; SECURITY; RSA;
D O I
10.1016/j.jksuci.2023.101690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, an emerging paradigm of edge computing, called Multi-Access Edge Computing (MEC), is widely used in a broad range of applications. MEC has been recently used as a driving technology for 5G net-works. However, MEC encompasses some security problems, such as communicating with untrusted third-party service providers commonly known as location-based service (LBS) providers. In this paper, we propose a novel fuzzy-based misbehavior detection system for Internet of Things (IoT) in a 5G-based MEC environment to solve the previous problems. Our proposed system is comprised of a multi-tier architecture that is linked by IoT gateways and mobile core network. In our architecture, we employ a novel mechanism that embeds a security entity called Regional Certificate Authority in a 5G macro base station. This security entity acts as a passport for the IoT gateway to communicate with other security entities present in our system that are located in the core infrastructure. Besides that, our system utilizes a distributed certificate revocation mechanism for malicious LBS providers via simultaneously updating the internal blocklists employed by more than one system entity. In addition, we adopt in our architec-ture a novel penalty system for malicious LBS providers, which is used for penalizing providers in case proved to be malicious as well as actively isolating them from the network. On the other hand, our system provides conditional anonymity for the incident's reporter. Also, we present various security features maintained by the proposed system to thwart well-known attacks as well as we demonstrate efficiency and robustness of our system. Finally, we provide the overhead of our system and compare it with other state-of-the-art approaches where results show that the proposed system relatively incurs the least overhead.& COPY; 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
    Bahrami, Bahareh
    Khayyambashi, Mohammad Reza
    Mirjalili, Seyedali
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05): : 3237 - 3262
  • [42] Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
    Bahareh Bahrami
    Mohammad Reza Khayyambashi
    Seyedali Mirjalili
    [J]. Cluster Computing, 2023, 26 : 3237 - 3262
  • [43] A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework
    Poongodi, M.
    Bourouis, Sami
    Ahmed, Ahmed Najat
    Vijayaragavan, M.
    Venkatesan, K. G. S.
    Alhakami, Wajdi
    Hamdi, Mounir
    [J]. COMPUTER COMMUNICATIONS, 2022, 192 : 48 - 56
  • [44] Blockchain-Based Service Migration for Multi-Access Edge Computing
    Ren, Shuyang
    Lee, Choonhwa
    [J]. 2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 51 - 55
  • [45] An Optimization Scheme for SCMA-Based Multi-Access Edge Computing
    Liu, Pengtao
    Lei, Jing
    Liu, Wei
    [J]. 2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [46] Towards Multi-Access Edge based Vehicular Fog Computing Architecture
    Mekki, Tesnim
    Jabri, Issam
    Rachedi, Abderrezak
    Ben Jemaa, Maher
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [47] Deep Q-network-based auto scaling for service in a multi-access edge computing environment
    Lee, Do-Young
    Jeong, Se-Yeon
    Ko, Kyung-Chan
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (06)
  • [48] Latency Aware Placement in Multi-access Edge Computing
    Harris, Dor
    Naor, Joseph
    Raz, Danny
    [J]. 2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), 2018, : 132 - 140
  • [49] Collaborative Computation Offloading for Multi-access Edge Computing
    Yu, Shuai
    Langar, Rami
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 689 - 694
  • [50] Survey on Multi-Access Edge Computing Security and Privacy
    Ranaweera, Pasika
    Jurcut, Anca Delia
    Liyanage, Madhusanka
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (02): : 1078 - 1124