Smart City Gnosys

Smart city article details

Title Secure Computing For Fog-Enabled Industrial Iot
ID_Doc 47616
Authors Alvi A.N.; Ali B.; Saleh M.S.; Alkhathami M.; Alsadie D.; Alghamdi B.
Year 2024
Published Sensors, 24, 7
DOI http://dx.doi.org/10.3390/s24072098
Abstract Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame. For faster execution, these tasks are offloaded to nearby fog nodes. Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks. Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities. This results in an increased delay of task computation for trustworthy nodes. To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks. However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame. To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes. EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame. Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities. Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network. The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes. © 2024 by the authors.
Author Keywords industrial IoT; secure computing; trustable computing


Similar Articles


Id Similarity Authors Title Published
1719 View0.901Zhou H.; Pal S.; Jadidi Z.; Jolfaei A.A Fog-Based Security Framework For Large-Scale Industrial Internet Of Things EnvironmentsIEEE Internet of Things Magazine, 6, 1 (2023)
47643 View0.893Shruti; Rani S.; Srivastava G.Secure Hierarchical Fog Computing-Based Architecture For Industry 5.0 Using An Attribute-Based Encryption SchemeExpert Systems with Applications, 235 (2024)
33015 View0.886Abosata N.; Al-Rubaye S.; Inalhan G.; Emmanouilidis C.Internet Of Things For System Integrity: A Comprehensive Survey On Security, Attacks And Countermeasures For Industrial ApplicationsSensors, 21, 11 (2021)
4511 View0.876Roshan R.; Matam R.; Mukherjee M.; Lloret J.; Tripathy S.A Secure Task-Offloading Framework For Cooperative Fog Computing EnvironmentProceedings - IEEE Global Communications Conference, GLOBECOM (2020)
5270 View0.871Aouedi O.; Vu T.-H.; Sacco A.; Nguyen D.C.; Piamrat K.; Marchetto G.; Pham Q.-V.A Survey On Intelligent Internet Of Things: Applications, Security, Privacy, And Future DirectionsIEEE Communications Surveys and Tutorials, 27, 2 (2025)
17036 View0.864Buja A.Cybersecurity Of Industrial Internet Of Things (Iiot)Cybersecurity of Industrial Internet of Things (IIoT) (2025)
16945 View0.864Buja A.; Apostolova M.; Luma A.; Januzaj Y.Cyber Security Standards For The Industrial Internet Of Things (Iiot)- A Systematic ReviewHORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings (2022)
21438 View0.861Jedidi A.Dynamic Trust Security Approach For Edge Computing-Based Mobile Iot Devices Using Artificial IntelligenceEngineering Research Express, 6, 2 (2024)
22047 View0.859Sivakumar S.; Abraham M.; Babu J.J.; Perumal V.; Polepaka S.; Senthilkumar C.Effective And Secure Task Offloading In Iot Edge Computing Through A Multi-Feedback Trust MechanismProceedings of the 2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023 (2023)
5322 View0.858Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)