An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment

被引:6
|
作者
Minu, R., I [1 ]
Nagarajan, G. [2 ]
Munshi, Asmaa [3 ]
Venkatachalam, K. [4 ]
Almukadi, Wafa [5 ]
Abouhawwash, Mohamed [6 ,7 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Technol, Kattankulathur 603203, India
[2] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[3] Univ Jeddah, Cybersecur Dept, Jeddah 23218, Saudi Arabia
[4] Univ Hradec Kralove, Dept Appl Cybernet, Hradec Kralove 50003, Czech Republic
[5] Univ Jeddah, Dept Software Engn, Jeddah 23218, Saudi Arabia
[6] Mansoura Univ, Fac Sci, Math Dept, Mansoura 35516, Egypt
[7] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Behavioral sciences; Smart cities; Cloud computing; Security; Internet of Things; Real-time systems; Image edge detection; Edge computing; IoT; MEC; smart cities; Sybil attack; SYBIL ATTACK; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2022.3200703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.
引用
收藏
页码:89499 / 89508
页数:10
相关论文
共 50 条
  • [41] Designing a FIWARE-Based Smart Campus with IoT Edge-Enabled Intelligence
    Martins, Pedro
    Lopes, Sergio, I
    Curado, Antonio
    TRENDS AND APPLICATIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2021, 1367 : 557 - 569
  • [42] Edge Intelligence for Smart EL Images Defects Detection of PV Plants in the IoT-Based Inspection System
    Tang, Wuqin
    Yang, Qiang
    Hu, Xiaochen
    Yan, Wenjun
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3047 - 3056
  • [43] Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things
    Tukur, Yusuf Muhammad
    Thakker, Dhavalkumar
    Awan, Irfan-Ullah
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
  • [44] Data-Augmentation-Based Cellular Traffic Prediction in Edge-Computing-Enabled Smart City
    Wang, Zi
    Hu, Jia
    Min, Geyong
    Zhao, Zhiwei
    Wang, Jin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4179 - 4187
  • [45] Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment
    Alrayes, Fatma S. S.
    Asiri, Mashael M. M.
    Maashi, Mashael
    Salama, Ahmed S. S.
    Hamza, Manar Ahmed
    Ibrahim, Sara Saadeldeen
    Zamani, Abu Sarwar
    Alsaid, Mohamed Ibrahim
    SUSTAINABILITY, 2023, 15 (08)
  • [46] An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment
    Kumar, S. Santhosh
    Kulothungan, K.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 287 - 292
  • [47] IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
    Yang, Yinqi
    Wang, Jian
    Zhai, Baoqin
    Liu, Jiqiang
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 3 - 17
  • [48] IoT/cloud-enabled smart services: A review on QoS requirements in fog environment and a proposed approach based on priority classification technique
    Ksentini, Amel
    Jebalia, Maha
    Tabbane, Sami
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [49] Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment
    Ali, Mudasir
    Shahroz, Mobeen
    Mushtaq, Muhammad Faheem
    Alfarhood, Sultan
    Safran, Mejdl
    Ashraf, Imran
    IEEE ACCESS, 2024, 12 : 40682 - 40699
  • [50] Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
    Shalaginov, Andrii
    Azad, Muhammad Ajmal
    FUTURE INTERNET, 2021, 13 (11)