An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:6
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [21] Designing a FIWARE-Based Smart Campus with IoT Edge-Enabled Intelligence
    Martins, Pedro
    Lopes, Sergio, I
    Curado, Antonio
    TRENDS AND APPLICATIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2021, 1367 : 557 - 569
  • [22] An Auction based Edge Resource Allocation Mechanism for IoT-enabled Smart Cities
    Sahoo, Sampa
    Sahoo, Kshira Sagar
    Sahoo, Bibhudatta
    Gandomi, Amir H.
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1280 - 1286
  • [23] Edge computing framework for enabling situation awareness in IoT based smart city
    Hossain, S. K. Alamgir
    Rahman, Md Anisur
    Hossain, M. Anwar
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 226 - 237
  • [24] Knowledge-based Spatial Reasoning for IoT-Enabled Smart City Applications
    Toenjes, Ralf
    Kuemper, Daniel
    Fischer, Marten
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 736 - 737
  • [25] A LoRa enabled IoT-based Air Quality Monitoring System for Smart City
    Twahirwa, Evariste
    Mtonga, Kambombo
    Ngabo, Desire
    Kumaran, Santhi
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 379 - 385
  • [26] Content-Based Publish/Subscribe Communication Model between IoT Devices in Smart City Environment
    Ozturk, Fulya
    Ozdemir, Ayse Meliha
    2019 7TH INTERNATIONAL ISTANBUL SMART GRIDS AND CITIES CONGRESS AND FAIR (ICSG ISTANBUL 2019), 2019, : 189 - 193
  • [27] An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment
    Kumar, S. Santhosh
    Kulothungan, K.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 287 - 292
  • [28] IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
    Yang, Yinqi
    Wang, Jian
    Zhai, Baoqin
    Liu, Jiqiang
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 3 - 17
  • [29] Sybil Attack Detection for Secure IoT-Based Smart Healthcare Environments
    Li J.
    Wang Z.
    Journal of The Institution of Engineers (India): Series B, 2024, 105 (06) : 1557 - 1569
  • [30] FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities
    Alrashdi, Ibrahim
    Alqazzaz, Ali
    Alharthi, Raed
    Aloufi, Esam
    Zohdy, Mohamed A.
    Ming, Hua
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 515 - 522