An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:6
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [41] FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals
    Lei, Wenxin
    Pang, Zhibo
    Wen, Hong
    Hou, Wenjing
    Han, Wen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 9302 - 9311
  • [42] A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT
    Deng, Xiaoheng
    Chen, Bin
    Chen, Xuechen
    Pei, Xinjun
    Wan, Shaohua
    Goudos, Sotirios K.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 1445 - 1454
  • [43] A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment
    Simpson, Serin, V
    Nagarajan, G.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 544 - 563
  • [44] A novel-cascaded ANFIS-based deep reinforcement learning for the detection of attack in cloud IoT-based smart city applications
    Almasri, Marwah Mohammad
    Alajlan, Abrar M.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (22):
  • [45] Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
    Pundir, Sumit
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Park, Youngho
    SENSORS, 2020, 20 (05)
  • [46] A Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks
    Papalkar, Rahul R.
    Alvi, Abrar S.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (06): : 1 - 11
  • [47] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Junwei Yan
    Tao Jiang
    Liwei Lin
    Zhengyu Wu
    Xiucai Ye
    Mengke Tian
    Yong Wang
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [48] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Yan, Junwei
    Jiang, Tao
    Lin, Liwei
    Wu, Zhengyu
    Ye, Xiucai
    Tian, Mengke
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [49] An ECC-based authentication protocol for fog-IoT enabled smart home environment
    Mohanta B.K.
    Jena D.
    Patnaik S.
    Mohanta, Bhabendu Kumar (C116004@iiit-bh.ac.in), 1600, Inderscience Publishers (20): : 25 - 46
  • [50] Decision Tree with Pearson Correlation-based Recursive Feature Elimination Model for Attack Detection in IoT Environment
    Padmashree, A.
    Krishnamoorthi, M.
    INFORMATION TECHNOLOGY AND CONTROL, 2022, 51 (04): : 771 - 785