An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:5
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [1] Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment
    Gupta, Brij B.
    Gaurav, Akshat
    Chui, Kwok Tai
    Arya, Varsha
    EDGE COMPUTING - EDGE 2023, 2024, 14205 : 14 - 23
  • [2] Online data poisoning attack against edge AI paradigm for IoT-enabled smart city
    Zhu, Yanxu
    Wen, Hong
    Wu, Jinsong
    Zhao, Runhui
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (10) : 17726 - 17746
  • [3] An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment
    Malini, P.
    Kavitha, K. R.
    COMPUTERS & SECURITY, 2024, 141
  • [4] Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment
    Alandjani, Gasim
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (08) : 231 - 238
  • [5] IoT-enabled edge computing model for smart irrigation system
    Premkumar, S.
    Sigappi, AN.
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 632 - 650
  • [6] Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model
    Hassan, Mohammad Mehedi
    Gumaei, Abdu
    Huda, Shamsul
    Almogren, Ahmad
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6154 - 6162
  • [7] Optimal Hybrid Deep Learning Enabled Attack Detection and Classification in IoT Environment
    Alruwaili, Fahad F.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 99 - 115
  • [8] Lighting-Enabled Smart City Applications and Ecosystems Based on the IoT
    Murthy, Abhishek
    Han, Dong
    Jiang, Dan
    Oliveira, Talmai
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 757 - 763
  • [9] Botnet Attack Detection at the IoT Edge Based on Sparse Representation
    Tzagkarakis, Christos
    Petroulakis, Nikolaos
    Ioannidis, Sotiris
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [10] Energy Analysis-Based Cyber Attack Detection by IoT with Artificial Intelligence in a Sustainable Smart City
    Prabakar, D.
    Sundarrajan, M.
    Manikandan, R.
    Jhanjhi, N. Z.
    Masud, Mehedi
    Alqhatani, Abdulmajeed
    SUSTAINABILITY, 2023, 15 (07)