Abstract

Several massive real-time services could be offered to the residents of smart cities by the incorporation of collaborative applications. All such applications require latency-aware network services for accomplishing various needs of the smart city environment. It requires technological enhancements to the existing mechanisms to serve better in smart environments. Such enhancements to the prevailing approaches also opened a wide range of chances to the intruders. Among such infringes, the identity-based attack is the most powerful attack, which may directly affect the credibility of legitimate network components. Such attackers aim to steal the identity of other legitimate entities. Thus, the prevailing trust-based approaches cannot withstand such attacks. The proposed Edge-based approach, EBAD has been designed for smart city environments, as a robust prevention mechanism for identity theft and misuse. EBAD is efficient enough to identify the Sybil attacker nodes and the early identification of such attacker nodes will nullify the probability of performing the Sybil attack over a Cooperative blackmailing attack (SA-CBA). EBAD uses an Edge-based accusation analysis approach to assess the malicious behavior of the network entities. The major part of the required computations has been placed at the edge node for reducing the computational overload of the end devices. Finally, the efficiency of EBAD has been examined under a malicious environment.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.