Abstract
Advancements in IoT have integrated it into every aspect of human life. By using the Internet as its foundation, IoT connects a vast array of cyber-physical devices, from simple sensors to advanced servers. However, this extensive connectivity also broadens the attack surface, increasing vulnerability to cyber threats due to the complex communication and non-standard technologies involved. The proposed response selection method addresses this by employing fuzzy logic inference at edge nodes, which processes the ambiguous data generated by IoT devices. The system evaluates four metrics: device importance, severity score, response cost, and success rate, calculated efficiently at the edge. Proximity to end devices makes edge nodes ideal for this task. Simulations reveal that the edge-based approach improves response success rates by about 5% compared to cloud-based implementations. This underscores the model’s ability to accurately and swiftly select appropriate responses, demonstrating the effectiveness of edge computing in enhancing IoT security and performance.
Similar content being viewed by others
Data Availability
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.
References
Balte A, Kashid A&, Patil B. Security issues in internet of things (IoT): a survey. Int J Adv Res Comput Sci Softw Eng. 2015;5(4):450–5.
Banerjee Anjishnu, David B, Dunson, Surya T, Tokdar. ‘Efficient gaussian process regression for large datasets’. Biometrika. 2012;100(1):75–89.
Kolias C, Kambourakis G, Stavrou A&, Gritzalis S. Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutorials. 2016;18(1):184–208.
Kott A, Wang C, Erbacher RF. Cyber defense and situational awareness’. Springer; 2015;62.
Roy V. An effective FOG computing based distributed forecasting of cyber-attacks in internet of things. J Cybersecur Inform Manage. 2023;12(2):8–17.
Riggins Frederick J. & Samuel Fosso Wamba 2015, ‘Research directions on the adoption, usage, and impact of the internet of things through the use of big data analytics’, 48th Hawaii International Conference on System Sciences (HICSS), pp. 1531–1540.
Dewanta F, Mambo MBPT, Scheme. Establishing trusted vehicular FOG computing service for rural area based on blockchain approach. IEEE Trans Veh Technol. 2021;70:1752–69.
Yakubu J, Abdulhamid SM, Christopher HA, Chiroma H, Abdullahi M. Security challenges in edge-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ. 2019;5:209–33.
Roy V. A context-aware internet of things (IoT) founded approach to scheming an operative priority-based scheduling algorithms. J Cybersecur Inform Manage. 2024;13(1).
Wang J, Li D. Adaptive computing optimization in software-defined network-based industrial internet of things with FOG computing. Sensors. 2018;18:2509.
Sahil; Sood SK. FOG-cloud centric IoT-based cyber physical framework for panic oriented disaster evacuation in smart cities. Earth Sci Inf. 2022;15:1449–70.
Kumar P, Gupta GP, Tripathi RA, Distributed Ensemble. Design based intrusion detection system using FOG computing to protect the internet of things networks. J Ambient Intell Humaniz Comput. 2021;12:9555–72.
Saini K, Kalra S, Sood SK. Disaster emergency response framework for smart buildings. Future Gener Comput Syst. 2022;131:106–20.
Roy V, Roy L, Ahluwalia R, Khambra G, Ramesh M, Rajasekhar K. An advance implementation of machine learning techniques for the prediction of cervical cancer, 2023 IEEE International Conference on ICT in Business Industry & Government.
Villegas-Ch W, Barahona-Espinosa S, Gaibor-Naranjo W, Mera-Navarrete A. Model for the detection of falls with the use of artificial intelligence as an assistant for the care of the elderly. Computation. 2022;10:195.
Rezapour R, Asghari P, Javadi HHS, Ghanbari S. Security in FOG computing: a systematic review on issues, challenges and solutions. Comput Sci Rev. 2021;41:100421.
Wang S, Zhao T, Pang S. Task scheduling algorithm based on improved firework algorithm in FOG computing. IEEE Access. 2020;8:32385–94.
Ortiz-Garcés I, Villegas-Ch W. Model of telecommunications infrastructure for the deployment of technological services from the CLOUD to all the localities of the Ministry of Education in Ecuador. RISTI—Rev Iber Sist Tecnol Inf. 2019;E19:531–42.
Singh J, Singh P, Gill SSFOG, Computing. A taxonomy, systematic review, current trends and research challenges. J Parallel Distrib Comput. 2021;157:56–85.
Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A. A survey on FOG computing for the internet of things. Pervasive Mob Comput. 2019;52:71–99.
Sarkar S, Chatterjee S, Misra S. Assessment of the suitability of FOG computing in the context of internet of things. IEEE Trans Cloud Comput. 2018;6:46–59.
Zhang PY, Zhou MC, Fortino G. Security and trust issues in FOG computing: a survey. Future Gener Comput Syst. 2018;88:16–27.
Hu P, Dhelim S, Ning H, Qiu T. Survey on FOG computing: architecture, key technologies, applications and open issues. J Netw Comput Appl. 2017;98:27–42.
Lera I, Guerrero C, Juiz CYAFS. A simulator for IoT scenarios in FOG computing. IEEE Access. 2019;7:91745–58.
Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA. A comprehensive survey on FOG computing: state-of-the-art and research challenges. IEEE Commun Surv Tutor. 2018;20:416–64.
Moshayedi AJ, Roy AS, Taravet A, Liao L, Wu J, Gheisari MA. Secure traffic police remote sensing approach via a deep learning-based low-altitude vehicle speed detector through UAVs in smart cites: algorithm, implementation and evaluation. Future Transp. 2023;3:12.
Roy V. An improved image encryption consuming fusion transmutation and edge operator. J Cybersecur Inform Manage. 2021;8(1):42–52.
Tselios C, Politis I, Amaxilatis D, Akrivopoulos O, Chatzigiannakis I, Panagiotakis S, Markakis EK. Melding FOG computing and IoT for deploying secure, response-capable healthcare services in 5G and beyond. Sensors. 2022;22:3375.
Prabavathy S, Sundarakantham K, Mercy Shalinie S. Design of cognitive FOG computing for autonomic security system in critical infrastructure. J Univers Comput Sci. 2018;24(5):577–602.
Alrizq M, Stalin S, Alyami S, Roy V, Mishra A, Chandanan AK. Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network. Wireless Netw. 2023:1–13.
Funding
Not Applicable.
Author information
Authors and Affiliations
Contributions
Marcelo Zambrano-Vizuete: Consumption and design of study and Acquisition of the data, Juan Minango-Negrete: Analysis and interpretation of the data and Drafting, Wladimir Paredes-Parada: Formalization an editing, Review and investigation, Jorge Pérez-Chimborazo: Conceptualization, Ana Zambrano-Vizuete: Investigation and analysis.
Corresponding author
Ethics declarations
Ethical Approval
This article does not contain any studies with animals performed by any of the authors.
Conflict of Interest
The authors declare no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zambrano-Vizuete, M., Minango-Negrete, J., Paredes-Parada, W. et al. Evaluating the Sustainability of Cerebral Edge Computing Inventiveness for Acquiring Internet of Things Substructure Autonomously. SN COMPUT. SCI. 5, 922 (2024). https://doi.org/10.1007/s42979-024-03220-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03220-6