An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:5
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [31] A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment
    James, Fathima
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [32] Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment
    Ali, Mudasir
    Shahroz, Mobeen
    Mushtaq, Muhammad Faheem
    Alfarhood, Sultan
    Safran, Mejdl
    Ashraf, Imran
    IEEE ACCESS, 2024, 12 : 40682 - 40699
  • [33] A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment
    Taher, Fatma
    Elhoseny, Mohamed
    Hassan, Mohammed K.
    El-Hasnony, Ibrahim M.
    IEEE ACCESS, 2022, 10 : 127192 - 127204
  • [34] A learning automata based edge resource allocation approach for IoT-enabled smart cities
    Sahoo, Sampa
    Sahoo, Kshira Sagar
    Sahoo, Bibhudatta
    Gandomi, Amir H.
    Digital Communications and Networks, 2024, 10 (05) : 1258 - 1266
  • [35] A learning automata based edge resource allocation approach for IoT-enabled smart cities
    Sampa Sahoo
    Kshira Sagar Sahoo
    Bibhudatta Sahoo
    Amir HGandomi
    Digital Communications and Networks, 2024, 10 (05) : 1258 - 1266
  • [36] IoT Based Indoor Location Detection System for Smart Home Environment
    Nath, Rajdeep Kumar
    Bajpai, Rajnish
    Thapliyal, Himanshu
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [37] WSN and IoT based smart city model using the MQTT protocol
    Kumar, Vishal
    Sakya, Gayatri
    Shankar, Chandra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1423 - 1434
  • [38] Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection
    Malathi, S.
    Begum, S. Razool
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
  • [39] A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT
    Deng, Xiaoheng
    Chen, Bin
    Chen, Xuechen
    Pei, Xinjun
    Wan, Shaohua
    Goudos, Sotirios K.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 1445 - 1454
  • [40] LoRa-Based Smart IoT Application for Smart City: An Example of Human Posture Detection
    Han, Jinkun
    Song, Wei
    Gozho, Amanda
    Sung, Yunsick
    Ji, Sumi
    Song, Liangliang
    Wen, Long
    Zhang, Qi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):