Trust management for internet of things using cloud computing and security in smart cities

被引:0
作者
Mamoun Alazab
Gunasekaran Manogaran
Carlos Enrique Montenegro-Marin
机构
[1] College of Engineering,Department of Electrical Engineering & Computer Science
[2] IT and Environment at Charles Darwin University,College of Information and Electrical Engineering
[3] Howard University,Facultad de Ingeniería
[4] Asia University,undefined
[5] Universidad Distrital Francisco José de Caldas,undefined
来源
Cluster Computing | 2022年 / 25卷
关键词
Smart city; Internet of things; Security; Communication;
D O I
暂无
中图分类号
学科分类号
摘要
Many consumers participate in the smart city via smart portable gadgets such as wearables, personal gadgets, mobile devices, or sensor systems. In the edge computation systems of IoT in the smart city, the fundamental difficulty of the sensor is to pick reliable participants. Since not all smart IoT gadgets are dedicated, certain intelligent IoT gadgets might destroy the networks or services deliberately and degrade the customer experience. A trust-based internet of things (TM-IoT) cloud computing method is proposed in this research. The problem is solved by choosing trustworthy partners to enhance the quality services of the IoT edging network in the Smart architectures. A smart device choice recommendation method based on the changing networks was developed. It applied the evolutionary concept of games to examine the reliability and durability of the technique of trust management presented in this article. The reliability and durability of the trustworthiness-managing system, the Lyapunov concept was applied.A real scenario for personal-health-control systems and air-qualitymonitoring and assessment in a smart city setting confirmed the efficiency of the confidence-management mechanism. Experiments have demonstrated that the methodology for trust administration suggested in this research plays a major part in promoting multi-intelligent gadget collaboration in the IoT edge computer system with an efficiency of 97%. It resists harmful threads against service suppliers more consistently and is ideal for the smart world's massive IoT edge computer system.
引用
收藏
页码:1765 / 1777
页数:12
相关论文
共 123 条
[11]  
Gao J(2020)Concurrent service access and management framework for user-centric future internet of things in smart cities Complex Intell. Syst. 34 67-74
[12]  
Wang H(2018)Security and privacy challenges in smart cities Sustain. Cities Soc. 65 34-6296
[13]  
Shen H(2019)Security enhancement of an anonymous roaming authentication scheme with two-factor security in a smart city Neurocomputing 154 66-637
[14]  
Hu L(2018)China's 2016 cyber security law on foreign technology firms and China's big data and smart city dreams Comput. Law Secur. Rev. 7 6288-17
[15]  
Nguyen NT(2018)IoT applications in the ecological industry chain from information security and smart city perspectives Comput. Electr. Eng. 83 629-65
[16]  
Tao W(2020)Smart city-based e-commerce security technology with the improvement of SET network protocol Comput. Commun. 2021 1-803
[17]  
Leu MC(2018)Decentralized big data auditing for smart city environments leveraging blockchain technology IEEE Access 81 103722-7990
[18]  
Liu XF(2018)Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for the smart city environment Future Gener. Comput. Syst. 26 47-256
[19]  
Shahriar MR(2021)BDN-GWMNN: internet of things (IoT) enabled secure smart city applications Wirel. Personal Commun. 167 120743-2879
[20]  
Al Sunny SN(2021)Holistic, big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities Microprocess. Microsyst. 33 788-768