Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

An edge based trustworthy environment establishment for internet of things: an approach for smart cities - 2021

An edge based trustworthy environment establishment for internet of things: an approach for smart cities

Research Area:  Wireless Sensor Networks

Abstract:

With Smart city advancements, several massive collaborative services could be offered to the end users. Since the Internet of Things (IoT) devices in smart city environment are provided only with limited resource capacity, such devices are not able to deal with heterogeneous and cross-application services. Also IoT devices persistently produce huge measure of information which requires strict latency-aware processing. Cloud computing cannot ensure a real time response to the critical smart city applications because of network constraints. Edge computing has been introduced at this juncture, to address the issues related with conventional cloud computing. In spite of the fact that edge computing is a promising technology to handle latency and heterogeneity related issues, the large deployment of tiny edge nodes additionally introduces several security issues. Edge nodes are mostly vulnerable to identity-based attacks like Sybil attack, which empowers the attacker to perform various other forms of attacks. The impact of Sybil attack over Co-operative Blackmailing attack in accusation/voting based smart city environment is significantly high. Since the attacker node claims the identity of some other legitimate nodes, such attacks cannot be defended by conventional trust based solutions. The proposed Edge based Trustworthy Environment Establishment scheme (E-TEE) primarily explores the possibilities of identity based attacks on an edge based smart city environment. E-TEE contributes a robust edge based mechanism for the successful identification of Sybil nodes over Co-operative Blackmailing attack. Eventually, the performance of the proposed trustworthy environment has been validated.

Keywords:  

Author(s) Name:  Serin V. Simpson & G. Nagarajan

Journal name:  Wireless Networks

Conferrence name:  

Publisher name:  Springer

DOI:  10.1007/s11276-021-02667-2

Volume Information: