Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks

Aneeqa Ahmed, Kashif Naseer Qureshi, Muhammad Anwar, Farhan Masud, Junaid Imtiaz, Gwanggil Jeon

Research output: Contribution to journalArticlepeer-review

Abstract

A large number of interconnected smart devices or objects interact with the physical environment known as the Internet of Things (IoT). These networks efficiently perform complex tasks with a high level of intelligence without human intervention and require run-time processing and computation. Edge computing is introduced where devices are placed at the edge between the data source and the cloud. These devices can provide more powerful computational and storage capabilities to IoT users. With various benefits, one of the significant requirements is secure and trustworthy data communication. Various trust management schemes are introduced to guarantee the trustworthiness and isolation of the malicious nodes and give preference to the most trustworthy ones. The existing schemes selected trustworthy nodes again and again from the path without considering the load factor which leads them to be more vulnerable for the Denial of Services (DoS) attacks. In this paper, we propose a Link-based Penalized Trust Management scheme to provide trust management and consider load factors for the selection of most trustworthy nodes and provide a preemptive measure to secure the network from DoS attacks based on its link's association. Simulation results indicate the better performance of the proposed scheme as compared with existing schemes.

Original languageEnglish
Pages (from-to)4237-4259
Number of pages23
JournalWireless Networks
Volume30
Issue number5
DOIs
Publication statusPublished - Jul 2024
Externally publishedYes

Keywords

  • Attacks
  • Cryptography
  • Internet of everything
  • Malicious nodes
  • Management
  • Network
  • Security
  • Trust

Fingerprint

Dive into the research topics of 'Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks'. Together they form a unique fingerprint.

Cite this