Smart City Gnosys

Smart city article details

Title Dynamic Trust Security Approach For Edge Computing-Based Mobile Iot Devices Using Artificial Intelligence
ID_Doc 21438
Authors Jedidi A.
Year 2024
Published Engineering Research Express, 6, 2
DOI http://dx.doi.org/10.1088/2631-8695/ad43b5
Abstract The Industrial Internet of Things (IIoT) encompasses various applications such as smart cities, healthcare, and agriculture, which rely on a multitude of interconnected devices. These applications demand specific performance requirements, including low latency and sufficient bandwidth. Edge computing has emerged as a promising solution to address the challenges associated with data flow processing. Particularly, in scenarios like smart cities, where a massive number of IIoT devices are deployed, edge computing serves as the primary data processing layer. However, the limited resources of edge computing, compared to cloud computing, pose significant security concerns for IIoT applications. In fact, this paper proposes a novel security system to secure the relation between the IIoT devices and edge computing. Dynamic Trust Security Approach (DTSA) leverages Artificial Intelligence to analyze, evaluate and enhance the security and privacy aspects of the IIoT devices’ interaction with edge computing. DTSA improve the security level of the IIoT system and improve the performance with more than 45% compare to the traditional method. © 2024 IOP Publishing Ltd.
Author Keywords edge computing; IoT application; IoT devices; latency; security


Similar Articles


Id Similarity Authors Title Published
5270 View0.88Aouedi O.; Vu T.-H.; Sacco A.; Nguyen D.C.; Piamrat K.; Marchetto G.; Pham Q.-V.A Survey On Intelligent Internet Of Things: Applications, Security, Privacy, And Future DirectionsIEEE Communications Surveys and Tutorials, 27, 2 (2025)
22047 View0.878Sivakumar S.; Abraham M.; Babu J.J.; Perumal V.; Polepaka S.; Senthilkumar C.Effective And Secure Task Offloading In Iot Edge Computing Through A Multi-Feedback Trust MechanismProceedings of the 2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023 (2023)
47643 View0.867Shruti; Rani S.; Srivastava G.Secure Hierarchical Fog Computing-Based Architecture For Industry 5.0 Using An Attribute-Based Encryption SchemeExpert Systems with Applications, 235 (2024)
33015 View0.866Abosata N.; Al-Rubaye S.; Inalhan G.; Emmanouilidis C.Internet Of Things For System Integrity: A Comprehensive Survey On Security, Attacks And Countermeasures For Industrial ApplicationsSensors, 21, 11 (2021)
47616 View0.861Alvi A.N.; Ali B.; Saleh M.S.; Alkhathami M.; Alsadie D.; Alghamdi B.Secure Computing For Fog-Enabled Industrial IotSensors, 24, 7 (2024)
44385 View0.858Guarda T.; Torres W.Real-Time Iot With Edge Computing: Efficiency, Security, And Future TrendsLecture Notes in Computer Science, 15889 LNCS (2026)
47634 View0.857Ajao L.A.; Apeh S.T.Secure Edge Computing Vulnerabilities In Smart Cities Sustainability Using Petri Net And Genetic Algorithm-Based Reinforcement LearningIntelligent Systems with Applications, 18 (2023)
47023 View0.856Hasan N.; Alam M.Role Of Machine Learning Approach For Industrial Internet Of Things (Iiot) In Cloud Environment-A Systematic ReviewInternational Journal of Advanced Technology and Engineering Exploration, 10, 108 (2023)
56218 View0.855Ward G.; Janczewski L.The Pisa Model: A Common Data Security Model For The Industrial Internet Of Things (Iiot) Information SystemsProceedings IMCIC - International Multi-Conference on Complexity, Informatics and Cybernetics, 2023-March (2023)
39214 View0.854Vermesan O.; Bacquet J.Next Generation Internet Of Things: Distributed Intelligence At The Edge And Human Machine-To-Machine CooperationNext Generation Internet of Things: Distributed Intelligence at the Edge and Human Machine-to-Machine Cooperation (2018)