With Smart city advancements, several massive collaborative services could be offered to the end users. Since the Internet of Things (IoT) devices in smart city environment are provided only with limited resource capacity, such devices are not able to deal with heterogeneous and cross-application services. Also IoT devices persistently produce huge measure of information which requires strict latency-aware processing. Cloud computing cannot ensure a real time response to the critical smart city applications because of network constraints. Edge computing has been introduced at this juncture, to address the issues related with conventional cloud computing. In spite of the fact that edge computing is a promising technology to handle latency and heterogeneity related issues, the large deployment of tiny edge nodes additionally introduces several security issues. Edge nodes are mostly vulnerable to identity-based attacks like Sybil attack, which empowers the attacker to perform various other forms of attacks. The impact of Sybil attack over Co-operative Blackmailing attack in accusation/voting based smart city environment is significantly high. Since the attacker node claims the identity of some other legitimate nodes, such attacks cannot be defended by conventional trust based solutions. The proposed Edge based Trustworthy Environment Establishment scheme (E-TEE) primarily explores the possibilities of identity based attacks on an edge based smart city environment. E-TEE contributes a robust edge based mechanism for the successful identification of Sybil nodes over Co-operative Blackmailing attack. Eventually, the performance of the proposed trustworthy environment has been validated.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Khan, L. U., Yaqoob, I., Tran, N. H., Kazmi, S. M. A., Dang, T. N., & Hong, C. S. (2020). Edge-computing-enabled smart cities: A comprehensive survey. IEEE Internet of Things Journal, 7(10), 10200–10232. https://doi.org/10.1109/JIOT.2020.2987070
Wang, B., Li, M., Jin, X., & Guo, C. (2020). A reliable iot edge computing trust management mechanism for smart cities. IEEE Access, 8, 46373–46399. https://doi.org/10.1109/ACCESS.2020.2979022
Wu, H., Zhang, Z., Guan, C., Wolter, K., & Xu, M. (2020). Collaborate edge and cloud computing with distributed deep learning for smart city internet of things. IEEE Internet of Things Journal, 7(9), 8099–8110. https://doi.org/10.1109/JIOT.2020.2996784
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2019). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16(6), 996–1010. https://doi.org/10.1109/TDSC.2017.2725953
Yao, D., Yu, C., Yang, L. T., & Jin, H. (2019). Using crowdsourcing to provide qos for mobile cloud computing. IEEE Transactions on Cloud Computing, 7(2), 344–356. https://doi.org/10.1109/TCC.2015.2513390
Sajith P.J., Nagarajan G., (2021) "Optimized Intrusion Detection System Using Computational Intelligent Algorithm," in Mallick P.K., Bhoi A.K., Chae GS., Kalita K. (eds) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, vol. 709, Springer, Singapore, pp. 633–639, 2021, doi: https://doi.org/10.1007/978-981-15-8752-8_64.
Zheng, M., Chen, S., Liang, W., & Song, M. (2019). NSAC: A novel clustering protocol in cognitive radio sensor networks for internet of things. IEEE Internet of Things Journal, 6(3), 5864–5865. https://doi.org/10.1109/JIOT.2019.2898166
Indra, Minu Rajasekaran, Nagarajan Govindan, Ravi Kumar Divakarla Naga Satya and Sundarsingh Jebaseelan Somasundram David Thanasingh, "Fuzzy rule based ontology reasoning," in Journal of Ambient Intelligence and Humanized Computing, pp. 1–7, 2020, doi: https://doi.org/10.1007/s12652-020-02163-z.
Lu, H., He, X., Du, M., Ruan, X., Sun, Y., & Wang, K. (2020). Edge QoE: Computation offloading with deep reinforcement learning for internet of things. IEEE Internet of Things Journal, 7(10), 9255–9265. https://doi.org/10.1109/JIOT.2020.2981557
Atzori, L., et al. (2019). Enhancing identifier/locator splitting through social internet of things. IEEE Internet of Things Journal, 6(2), 2974–2985. https://doi.org/10.1109/JIOT.2018.2877756
Hou, X., et al. (2020). Reliable computation offloading for edge-computing-enabled software-defined IoV. IEEE Internet of Things Journal, 7(8), 7097–7111. https://doi.org/10.1109/JIOT.2020.2982292
Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge Intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal, 7(8), 7457–7469. https://doi.org/10.1109/JIOT.2020.2984887
Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K., & Zhang, J. (2019). Edge Intelligence: Paving the last mile of artificial intelligence with edge computing. Proceedings of the IEEE, 107(8), 1738–1762. https://doi.org/10.1109/JPROC.2019.2918951
S. V. Simpson and G. Nagarajan, "SEAL—Security-Aware List-Based Routing Protocol for Mobile Ad Hoc Network," in Priyadarshi N., Padmanaban S., Ghadai R.K., Panda A.R., Patel R. (eds) Advances in Power Systems and Energy Management. ETAEERE 2020. Lecture Notes in Electrical Engineering, vol. 690. Springer, Singapore, pp. 519–530, 2021, doi: https://doi.org/10.1007/978-981-15-7504-4_51.
Murali, S., & Jamalipour, A. (2020). A lightweight intrusion detection for sybil attack under mobile rpl in the internet of things. IEEE Internet of Things Journal, 7(1), 379–388. https://doi.org/10.1109/JIOT.2019.2948149
Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2019). Analytical model for sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), 379–387. https://doi.org/10.1109/JIOT.2018.2843769
Pu, C. (2020). Sybil attack in rpl-based internet of things: Analysis and defenses. IEEE Internet of Things Journal, 7(6), 4937–4949. https://doi.org/10.1109/JIOT.2020.2971463
Simpson, S. V., & Nagarajan, G. (2021). A table based attack detection (TBAD) scheme for Internet of Things: An approach for Smart City environment. International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, 696–701. https://doi.org/10.1109/ESCI50559.2021.9396929
Wang, T., Wang, P., Cai, S., Ma, Y., Liu, A., & Xie, M. (2020). A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics, 16(9), 6083–6091. https://doi.org/10.1109/TII.2019.2955152
Jin, W., Xu, R., You, T., Hong, Y.-G., & Kim, D. (2020). Secure edge computing management based on independent microservices providers for gateway-centric iot networks. IEEE Access, 8, 187975–187990. https://doi.org/10.1109/ACCESS.2020.3030297
Usman, M., Jolfaei, A., & Jan, M. A. (2020). RaSEC: An Intelligent Framework for Reliable and Secure Multilevel Edge Computing in Industrial Environments. IEEE Transactions on Industry Applications, 56(4), 4543–4551. https://doi.org/10.1109/TIA.2020.2975488
Wang, T., Qiu, L., Sangaiah, A. K., Liu, A., Bhuiyan, M. Z. A., & Ma, Y. (2020). Edge-computing-based trustworthy data collection model in the internet of things. IEEE Internet of Things Journal, 7(5), 4218–4227. https://doi.org/10.1109/JIOT.2020.2966870
Zhang, J., Bai, W., & Wang, Y. (2019). Non-interactive ID-based proxy re-signature scheme for IoT based on mobile edge computing. IEEE Access, 7, 37865–37875. https://doi.org/10.1109/ACCESS.2019.2899828
F. Qiu, F. Wu and G. Chen, "Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems," in IEEE Transactions on Mobile Computing, vol. 14, no. 6, pp. 1287–1300, 1 2015, doi: https://doi.org/10.1109/TMC.2014.2352253.
Fang, W., Zhang, W., Xiao, J., Yang, Y., & Chen, W. (2017). A source anonymity-based lightweight secure AODV protocol for fog-based MANET. Sensors, 17(1421), 1–16. https://doi.org/10.3390/s17061421
Manimurugan, S., Al-Mutairi, S., Aborokbah, M. M., Chilamkurti, N., Ganesan, S., & Patan, R. (2020). Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access, 8, 77396–77404. https://doi.org/10.1109/ACCESS.2020.2986013
S. Lu, L. Li, K. Lam and L. Jia, "SAODV: a MANET routing protocol that can withstand black hole attack," in 2009 International Conference on Computational Intelligence and Security, pp. 421 - 425, 2010, doi: https://doi.org/10.1109/CIS.2009.244.
John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170. https://doi.org/10.1016/j.asej.2014.09.011
The authors did not receive financial support from any organization for the submitted work.
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Consent for publication
Authors give consent to Wireless Networks Journal to publish their article.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Simpson, S.V., Nagarajan, G. An edge based trustworthy environment establishment for internet of things: an approach for smart cities. Wireless Netw (2021). https://doi.org/10.1007/s11276-021-02667-2