Skip to main content

An edge based trustworthy environment establishment for internet of things: an approach for smart cities


With Smart city advancements, several massive collaborative services could be offered to the end users. Since the Internet of Things (IoT) devices in smart city environment are provided only with limited resource capacity, such devices are not able to deal with heterogeneous and cross-application services. Also IoT devices persistently produce huge measure of information which requires strict latency-aware processing. Cloud computing cannot ensure a real time response to the critical smart city applications because of network constraints. Edge computing has been introduced at this juncture, to address the issues related with conventional cloud computing. In spite of the fact that edge computing is a promising technology to handle latency and heterogeneity related issues, the large deployment of tiny edge nodes additionally introduces several security issues. Edge nodes are mostly vulnerable to identity-based attacks like Sybil attack, which empowers the attacker to perform various other forms of attacks. The impact of Sybil attack over Co-operative Blackmailing attack in accusation/voting based smart city environment is significantly high. Since the attacker node claims the identity of some other legitimate nodes, such attacks cannot be defended by conventional trust based solutions. The proposed Edge based Trustworthy Environment Establishment scheme (E-TEE) primarily explores the possibilities of identity based attacks on an edge based smart city environment. E-TEE contributes a robust edge based mechanism for the successful identification of Sybil nodes over Co-operative Blackmailing attack. Eventually, the performance of the proposed trustworthy environment has been validated.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13


  1. Khan, L. U., Yaqoob, I., Tran, N. H., Kazmi, S. M. A., Dang, T. N., & Hong, C. S. (2020). Edge-computing-enabled smart cities: A comprehensive survey. IEEE Internet of Things Journal, 7(10), 10200–10232.

    Article  Google Scholar 

  2. Wang, B., Li, M., Jin, X., & Guo, C. (2020). A reliable iot edge computing trust management mechanism for smart cities. IEEE Access, 8, 46373–46399.

    Article  Google Scholar 

  3. Wu, H., Zhang, Z., Guan, C., Wolter, K., & Xu, M. (2020). Collaborate edge and cloud computing with distributed deep learning for smart city internet of things. IEEE Internet of Things Journal, 7(9), 8099–8110.

    Article  Google Scholar 

  4. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2019). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16(6), 996–1010.

    Article  Google Scholar 

  5. Yao, D., Yu, C., Yang, L. T., & Jin, H. (2019). Using crowdsourcing to provide qos for mobile cloud computing. IEEE Transactions on Cloud Computing, 7(2), 344–356.

    Article  Google Scholar 

  6. Sajith P.J., Nagarajan G., (2021) "Optimized Intrusion Detection System Using Computational Intelligent Algorithm," in Mallick P.K., Bhoi A.K., Chae GS., Kalita K. (eds) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, vol. 709, Springer, Singapore, pp. 633–639, 2021, doi:

  7. Zheng, M., Chen, S., Liang, W., & Song, M. (2019). NSAC: A novel clustering protocol in cognitive radio sensor networks for internet of things. IEEE Internet of Things Journal, 6(3), 5864–5865.

    Article  Google Scholar 

  8. Indra, Minu Rajasekaran, Nagarajan Govindan, Ravi Kumar Divakarla Naga Satya and Sundarsingh Jebaseelan Somasundram David Thanasingh, "Fuzzy rule based ontology reasoning," in Journal of Ambient Intelligence and Humanized Computing, pp. 1–7, 2020, doi:

  9. Lu, H., He, X., Du, M., Ruan, X., Sun, Y., & Wang, K. (2020). Edge QoE: Computation offloading with deep reinforcement learning for internet of things. IEEE Internet of Things Journal, 7(10), 9255–9265.

    Article  Google Scholar 

  10. Atzori, L., et al. (2019). Enhancing identifier/locator splitting through social internet of things. IEEE Internet of Things Journal, 6(2), 2974–2985.

    Article  Google Scholar 

  11. Hou, X., et al. (2020). Reliable computation offloading for edge-computing-enabled software-defined IoV. IEEE Internet of Things Journal, 7(8), 7097–7111.

    Article  Google Scholar 

  12. Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge Intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal, 7(8), 7457–7469.

    Article  Google Scholar 

  13. Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K., & Zhang, J. (2019). Edge Intelligence: Paving the last mile of artificial intelligence with edge computing. Proceedings of the IEEE, 107(8), 1738–1762.

    Article  Google Scholar 

  14. S. V. Simpson and G. Nagarajan, "SEAL—Security-Aware List-Based Routing Protocol for Mobile Ad Hoc Network," in Priyadarshi N., Padmanaban S., Ghadai R.K., Panda A.R., Patel R. (eds) Advances in Power Systems and Energy Management. ETAEERE 2020. Lecture Notes in Electrical Engineering, vol. 690. Springer, Singapore, pp. 519–530, 2021, doi:

  15. Murali, S., & Jamalipour, A. (2020). A lightweight intrusion detection for sybil attack under mobile rpl in the internet of things. IEEE Internet of Things Journal, 7(1), 379–388.

    Article  Google Scholar 

  16. Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2019). Analytical model for sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), 379–387.

    Article  Google Scholar 

  17. Pu, C. (2020). Sybil attack in rpl-based internet of things: Analysis and defenses. IEEE Internet of Things Journal, 7(6), 4937–4949.

    Article  Google Scholar 

  18. Simpson, S. V., & Nagarajan, G. (2021). A table based attack detection (TBAD) scheme for Internet of Things: An approach for Smart City environment. International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, 696–701.

    Article  Google Scholar 

  19. Wang, T., Wang, P., Cai, S., Ma, Y., Liu, A., & Xie, M. (2020). A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics, 16(9), 6083–6091.

    Article  Google Scholar 

  20. Jin, W., Xu, R., You, T., Hong, Y.-G., & Kim, D. (2020). Secure edge computing management based on independent microservices providers for gateway-centric iot networks. IEEE Access, 8, 187975–187990.

    Article  Google Scholar 

  21. Usman, M., Jolfaei, A., & Jan, M. A. (2020). RaSEC: An Intelligent Framework for Reliable and Secure Multilevel Edge Computing in Industrial Environments. IEEE Transactions on Industry Applications, 56(4), 4543–4551.

    Article  Google Scholar 

  22. Wang, T., Qiu, L., Sangaiah, A. K., Liu, A., Bhuiyan, M. Z. A., & Ma, Y. (2020). Edge-computing-based trustworthy data collection model in the internet of things. IEEE Internet of Things Journal, 7(5), 4218–4227.

    Article  Google Scholar 

  23. Zhang, J., Bai, W., & Wang, Y. (2019). Non-interactive ID-based proxy re-signature scheme for IoT based on mobile edge computing. IEEE Access, 7, 37865–37875.

    Article  Google Scholar 

  24. F. Qiu, F. Wu and G. Chen, "Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems," in IEEE Transactions on Mobile Computing, vol. 14, no. 6, pp. 1287–1300, 1 2015, doi:

  25. Fang, W., Zhang, W., Xiao, J., Yang, Y., & Chen, W. (2017). A source anonymity-based lightweight secure AODV protocol for fog-based MANET. Sensors, 17(1421), 1–16.

    Article  Google Scholar 

  26. Manimurugan, S., Al-Mutairi, S., Aborokbah, M. M., Chilamkurti, N., Ganesan, S., & Patan, R. (2020). Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access, 8, 77396–77404.

    Article  Google Scholar 

  27. S. Lu, L. Li, K. Lam and L. Jia, "SAODV: a MANET routing protocol that can withstand black hole attack," in 2009 International Conference on Computational Intelligence and Security, pp. 421 - 425, 2010, doi:

  28. John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170.

    Article  Google Scholar 

Download references


The authors did not receive financial support from any organization for the submitted work.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Serin V. Simpson.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Consent for publication

Authors give consent to Wireless Networks Journal to publish their article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Simpson, S.V., Nagarajan, G. An edge based trustworthy environment establishment for internet of things: an approach for smart cities. Wireless Netw (2021).

Download citation

  • Accepted:

  • Published:

  • DOI: