A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment

被引:21
作者
Simpson, Serin, V [1 ]
Nagarajan, G. [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 125卷
关键词
Smart cities; IoT; Edge Computing; MEC; Secure SEAL; Co-Operative Blackmailing Attack; GRAY-HOLE ATTACK; SMART; MANAGEMENT; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.06.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart cities have been developed with the help of large scale Internet of Things (IoT) device deployment. Under the combination of IoT and traditional Mobile ad-hoc network, the developers could design the communication model for smart city. The increased deployment of IoT devices in smart environment also raised the security and Quality of Service (QoS) related issues. The proposed, Secure approach for Smart city Environment by Accusation based List management (Secure SEAL) primarily explores the various chances of disruption in IoT network caused by co-operative attacks at the edge nodes. The internal co-operative attack is a type of attack which is jointly performed by a group of nodes in IoT network. There is no fine-grained technique to defend against co-operative attacks. To this end, a fuzzy based trustworthy environment is established for reducing the security threats in smart cities with the help of Edge Computing. The trustworthy environment ensures the timely identification of malicious entities and the detection of co-operative attacks. In Edge Computing, the computations required to perform at the end devices can be placed at Edge servers. This will reduce the expected latency and bandwidth utilization required for traditional cloud access. Secure SEAL uses a fuzzy based approach to avoid and isolate the presence of malicious nodes in IoT network. The suspected nodes are re-analyzed based on the reputation value obtained by reaction based trust evaluation. Eventually, the performance of the proposed trustworthy environment has been validated. The proposed work's efficacy in minimizing the impact of co operative attacks (more than 90%) is comparatively high. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:544 / 563
页数:20
相关论文
共 48 条
  • [1] Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Mehmood, Irfan
    Muhammad, Khan
    Venegas-Andraca, Salvador E.
    Peng, Jialiang
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (04)
  • [2] Alameri IA, 2018, ENG TECHNOL APPL SCI, V8, P2604
  • [3] A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things
    Alnumay, Waleed
    Ghosh, Uttam
    Chatterjee, Pushpita
    [J]. SENSORS, 2019, 19 (06)
  • [4] Highly Reputed Authenticated Routing in MANET (HRARAN)
    Annadurai, P.
    Vijayalakshmi, S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (01) : 455 - 472
  • [5] Smart City IoT Platform Respecting GDPR Privacy and Security Aspects
    Badii, Claudio
    Bellini, Pierfrancesco
    Difino, Angelo
    Nesi, Paolo
    [J]. IEEE ACCESS, 2020, 8 (08): : 23601 - 23623
  • [6] Serverless Blockchain-Enabled Architecture for IoT Societal Applications
    Benedict, Shajulin
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (05) : 1146 - 1158
  • [7] Bhattacharyya A., 2011, ARXIV PREPRINT ARXIV
  • [8] Bruzgiene R., 2017, AD HOC NETW
  • [9] A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
    Dantas Silva, Felipe S.
    Silva, Esau
    Neto, Emidio P.
    Lemos, Marcilio
    Venancio Neto, Augusto J.
    Esposito, Flavio
    [J]. SENSORS, 2020, 20 (11)
  • [10] A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading
    Dbouk, Toufic
    Mourad, Azzam
    Otrok, Hadi
    Tout, Hanine
    Talhi, Chamseddine
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (04): : 1665 - 1680