Volume 10 , Issue 2 , PP: 11–17, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Arash Salehpour 1 * , Tamara Zhukabayeva 2
Doi: https://doi.org/10.54216/IJWAC.100202
Wireless sensor Internet of Things (IoT) devices increasingly generate time-sensitive traffic that cannot be efficiently inspected only in a remote cloud. Fog computing reduces the distance between sensing devices and decision logic, but fog nodes must jointly manage latency, queue pressure, wireless channel variability, energy use and security risk. This paper presents FogSense-TSA, a trust-aware and anomaly-aware scheduling model for wireless sensor IoT traffic in fog computing environments. The model integrates traffic intensity, wireless link behaviour, fog-resource state and temporal trust into a local decision process that determines whether a device-window should be accepted, quarantined at the fog layer or escalated to cloud inspection. The empirical analysis is conducted using a reduced analysis-ready file aligned with a recent public IoT device-identification and anomaly-detection setting. The proposed formulation introduces three algorithmic components: online trust-risk scheduling, load-aware fog placement and adaptive threshold calibration. Mathematical analysis is provided for evidence aggregation, trust stability, latency decomposition, energy cost, constrained placement and computational complexity. The results show that fog placement substantially reduces service latency relative to cloud-only routing while preserving high anomaly-discrimination capability. The strongest predictors are trust score, flow intensity, jitter, fog CPU load, payload entropy and queue pressure, indicating that fog-layer security should be coupled with wireless access and resource conditions rather than treated as a separate classifier. The study provides a reproducible and interpretable basis for designing lightweight security and scheduling modules for wireless sensor IoT deployments.
Wireless sensor networks , Internet of Things , Fog computing , Anomaly detection , Trust-aware scheduling , Wireless IoT security
[1] M. Rabbani, J. Gui, F. Nejati, Z. Zhou, A. Kaniyamattam, M. Mirani, G. Piya, I. V. Opushnyev, R. Lu, and A. A. Ghorbani, “Device identification and anomaly detection in IoT environments,” IEEE Internet of Things Journal, vol. 12, no. 10, pp. 13625–13643, 2025, doi: 10.1109/JIOT.2024.3522863.
[2] E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, “CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment,” Sensors, vol. 23, no. 13, article 5941, 2023, doi: 10.3390/s23135941.
[3] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022, doi: 10.1109/ACCESS. 2022.3165809.
[4] T. Al Nuaimi, S. Al Zaabi, M. Alyilieli, M. AlMaskari, S. Alblooshi, F. Alhabsi, M. F. B. Yusof, and A. Al Badawi, “A comparative evaluation of intrusion detection systems on the Edge-IIoT-2022 dataset,” Intelligent Systems with Applications, vol. 20, article 200298, 2023, doi: 10.1016/j.iswa.2023.200298.
[5] W. Yao, H. Shi, and H. Zhao, “Scalable anomalybased intrusion detection for secure Internet of Things using generative adversarial networks in fog environment,” Journal of Network and Computer Applications, vol. 214, article 103622, 2023, doi: 10.1016/j.jnca.2023.103622.
[6] M. Tawfik, “Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection,” PLOS ONE, vol. 19, no. 8, article e0304082, 2024, doi: 10.1371/journal.pone.0304082.
[7] A. I. A. Alzahrani, A. Al-Rasheed, A. Ksibi, M. Ayadi, M. M. Asiri, and M. Zakariah, “Anomaly detection in fog computing architectures using custom Tab Transformer for Internet of Things,” Electronics, vol. 11, no. 23, article 4017, 2022, doi: 10.3390/electronics11234017.
[8] S. A. Abdulkareem, C. H. Foh, F. Carrez, and K. Moessner, “A lightweight SEL for attack detection in IoT/IIoT networks,” Journal of Network and Computer Applications, vol. 230, article 103980, 2024, doi: 10.1016/j.jnca.2024.103980.
[9] M. Bhavsar, K. Roy, J. Kelly, and O. Olusola, “Anomalybased intrusion detection system for IoT application,” Discover Internet of Things, vol. 3, article 5, 2023, doi: 10.1007/s43926-023-00034-5.
[10] M. A. Hossain, “Deep learning-based intrusion detection for IoT networks: A scalable and efficient approach,” EURASIP Journal on Information Security, vol. 2025, article 28, 2025, doi: 10.1186/s13635-025- 00202-w.
[11] A. Karimi, M. M. Rahman, and M. A. Khan, “An IoT healthcare system based on fog computing and data mining: A diabetic use case,” Applied Sciences, vol. 14, no. 17, article 7924, 2024, doi: 10.3390/app14177924.
[12] A. Pozzebon, “Edge and fog computing for the Internet of Things,” Future Internet, vol. 16, no. 3, article 101, 2024, doi: 10.3390/fi16030101.
[13] N. F. Syed, M. Ge, and Z. Baig, “Fog-cloud based intrusion detection system using recurrent neural networks and feature selection for IoT networks,” Computer Networks, vol. 225, article 109662, 2023, doi: 10.1016/j.comnet.2023.109662.