Smart City Gnosys

Smart city article details

Title Secure Edge Computing Vulnerabilities In Smart Cities Sustainability Using Petri Net And Genetic Algorithm-Based Reinforcement Learning
ID_Doc 47634
Authors Ajao L.A.; Apeh S.T.
Year 2023
Published Intelligent Systems with Applications, 18
DOI http://dx.doi.org/10.1016/j.iswa.2023.200216
Abstract The Industrial Internet of Things (IIoT) revolution has emerged as a promising network that enhanced information dissemination about the city's resources. This city's resources are wirelessly connected to different constrained devices (such as sensors, robotics, and actuators). However, the communication of this wireless information is threatened by several malicious attacks, cyber-attacks, and hackers. This is due to unsecured IIoT networks that were exposed as a potential back door entry point for the attacks. Consequently, this study aims to develop a security framework for the smart cities’ sustainability edge computing vulnerabilities using Petri Net and Genetic Algorithm-Based Reinforcement Learning (GARL). First, a common trust model for addressing information outflows in the network using a distributed authorization algorithm is proposed. This algorithm is implemented on a secure framework modeling in Petri Net called secure trust-aware philosopher privacy and authentication (STAPPA) for mitigation of the privacy breach in the networks. Genetic Algorithm-based Reinforcement Learning (GARL) is used to optimize the search, detect anomalies, and shortest route during the agent learning in the environment. The detection and accuracy rate results obtained over a secure framework using reinforcement learning are 98.75, 99, 99.50, 99.75, and 100% during simulation in the network environment. The average sensitivity of the detection rate is 1.000, while the average specificity outcome is 0.868. The result of the GARL simulation model obtained shows the best distance of 238.84 * 10−3 fitness when the search space is optimized by reducing the number of chromosomes to 10 in the model. These approaches help to detect anomalies and prevent unauthorized users from accessing edge computing components in the city architecture. © 2023 The Author(s)
Author Keywords Edge computing; Fog computing; Industrial internet of things; Reinforcement learning; Smart cities


Similar Articles


Id Similarity Authors Title Published
22888 View0.914Tian H.; Li R.; Di Y.; Zuo Q.; Wang J.Employing Rnn And Petri Nets To Secure Edge Computing Threats In Smart CitiesJournal of Grid Computing, 22, 1 (2024)
37777 View0.861Saheed Y.K.; Abdulganiyu O.H.; Tchakoucht T.A.Modified Genetic Algorithm And Fine-Tuned Long Short-Term Memory Network For Intrusion Detection In The Internet Of Things Networks With Edge CapabilitiesApplied Soft Computing, 155 (2024)
21438 View0.857Jedidi A.Dynamic Trust Security Approach For Edge Computing-Based Mobile Iot Devices Using Artificial IntelligenceEngineering Research Express, 6, 2 (2024)
7012 View0.854Ai-Based Zero Trust Architecture For Cognitive City Networks2025 2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025 (2025)
3587 View0.853Almasri M.M.; Alajlan A.M.A Novel-Cascaded Anfis-Based Deep Reinforcement Learning For The Detection Of Attack In Cloud Iot-Based Smart City ApplicationsConcurrency and Computation: Practice and Experience, 35, 22 (2023)