A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment

被引:21
作者
Simpson, Serin, V [1 ]
Nagarajan, G. [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 125卷
关键词
Smart cities; IoT; Edge Computing; MEC; Secure SEAL; Co-Operative Blackmailing Attack; GRAY-HOLE ATTACK; SMART; MANAGEMENT; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.06.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart cities have been developed with the help of large scale Internet of Things (IoT) device deployment. Under the combination of IoT and traditional Mobile ad-hoc network, the developers could design the communication model for smart city. The increased deployment of IoT devices in smart environment also raised the security and Quality of Service (QoS) related issues. The proposed, Secure approach for Smart city Environment by Accusation based List management (Secure SEAL) primarily explores the various chances of disruption in IoT network caused by co-operative attacks at the edge nodes. The internal co-operative attack is a type of attack which is jointly performed by a group of nodes in IoT network. There is no fine-grained technique to defend against co-operative attacks. To this end, a fuzzy based trustworthy environment is established for reducing the security threats in smart cities with the help of Edge Computing. The trustworthy environment ensures the timely identification of malicious entities and the detection of co-operative attacks. In Edge Computing, the computations required to perform at the end devices can be placed at Edge servers. This will reduce the expected latency and bandwidth utilization required for traditional cloud access. Secure SEAL uses a fuzzy based approach to avoid and isolate the presence of malicious nodes in IoT network. The suspected nodes are re-analyzed based on the reputation value obtained by reaction based trust evaluation. Eventually, the performance of the proposed trustworthy environment has been validated. The proposed work's efficacy in minimizing the impact of co operative attacks (more than 90%) is comparatively high. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:544 / 563
页数:20
相关论文
共 48 条
  • [41] Channel-Based Detection of Sybil Attacks in Wireless Networks
    Xiao, Liang
    Greenstein, Larry J.
    Mandayam, Narayan B.
    Trappe, Wade
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 492 - 503
  • [42] Xu XL, 2020, IEEE INTERNET THINGS, V7, P7919, DOI [10.1109/JIOT.2020.3000871, 10.1109/TITS.2020.2995622]
  • [43] Trust-Oriented IoT Service Placement for Smart Cities in Edge Computing
    Xu, Xiaolong
    Liu, Xihua
    Xu, Zhanyang
    Dai, Fei
    Zhang, Xuyun
    Qi, Lianyong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4084 - 4091
  • [44] Yao Dezhong, 2015, IEEE T CLOUD COMPUT, V7, P344
  • [45] New quantum-genetic based OLSR protocol (QG-OLSR) for Mobile Ad hoc Network
    Zhang, De-gan
    Cui, Yu-ya
    Zhang, Ting
    [J]. APPLIED SOFT COMPUTING, 2019, 80 : 285 - 296
  • [46] SafeCity: Toward Safe and Secured Data Management Design for IoT-Enabled Smart City Planning
    Zhang, Hui
    Babar, Muhammad
    Tariq, Muhammad Usman
    Jan, Mian Ahmad
    Menon, Varun G.
    Li, Xingwang
    [J]. IEEE ACCESS, 2020, 8 : 145256 - 145267
  • [47] Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems
    Zhang, Wei-Zhe
    Elgendy, Ibrahim A.
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Du, Xiaojiang
    Guizani, Mohsen
    El-Latif, Ahmed A. Abd
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10) : 8119 - 8132
  • [48] Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks
    Zhang, Yongmin
    Lan, Xiaolong
    Ren, Ju
    Cai, Lin
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (03) : 1227 - 1240