An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:6
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [1] A Table Based Attack Detection (TBAD) scheme for Internet of Things: An approach for Smart City Environment
    Simpson, Serin, V
    Nagarajan, G.
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 696 - 701
  • [2] A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment
    Simpson, Serin, V
    Nagarajan, G.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 544 - 563
  • [3] ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City
    Gheisari, Mehdi
    Quoc-Viet Pham
    Alazab, Mamoun
    Zhang, Xiaobo
    Fernandez-Campusano, Christian
    Srivastava, Gautam
    IEEE ACCESS, 2019, 7 : 155779 - 155786
  • [4] Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment
    Gupta, Brij B.
    Gaurav, Akshat
    Chui, Kwok Tai
    Arya, Varsha
    EDGE COMPUTING - EDGE 2023, 2024, 14205 : 14 - 23
  • [5] IoT-enabled edge computing model for smart irrigation system
    Premkumar, S.
    Sigappi, AN.
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 632 - 650
  • [6] Optimal Hybrid Deep Learning Enabled Attack Detection and Classification in IoT Environment
    Alruwaili, Fahad F.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 99 - 115
  • [7] A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment
    Taher, Fatma
    Elhoseny, Mohamed
    Hassan, Mohammed K.
    El-Hasnony, Ibrahim M.
    IEEE ACCESS, 2022, 10 : 127192 - 127204
  • [8] Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
    Alotaibi, Nouf Saeed
    Ahmed, Hassan Ibrahim
    Kamel, Samah Osama M.
    SENSORS, 2023, 23 (16)
  • [9] FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals
    Lei, Wenxin
    Pang, Zhibo
    Wen, Hong
    Hou, Wenjing
    Han, Wen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 9302 - 9311
  • [10] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Yan, Junwei
    Jiang, Tao
    Lin, Liwei
    Wu, Zhengyu
    Ye, Xiucai
    Tian, Mengke
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)