Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 17 , Issue 2 , PP: 38-50, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System

D. Jayakumar 1 * , K. Santhosh Kumar 2

  • 1 Research Scholar, Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamilnadu, India - (jayakumarifetd@gmail.com)
  • 2 Assistant Professor, Department of Information Technology, Annamalai University, Chidambaram, Tamilnadu, India - (santhosh09539@gmail.com)
  • Doi: https://doi.org/10.54216/FPA.170204

    Received: January 18, 2024 Revised: April 11, 2024 Accepted: September 15, 2024
    Abstract

    The Internet of Things (IoT) is in a recent state of instability due to the flooding of virtual data. It is believed that IoT and cloud computing have met their maximum thresholds and loading them with data after this point will only deteriorate their performance. Hence, edge computing has been introduced to mitigate the processing burden of IoT. To meet the security demands of edge computing, we intend to combine the method of blockchain along with edge computing for a better solution. Accordingly, this paper proposes the introduction of a novel blockchain model that is based on artificial neural networks and trust estimation called the behavioral monitoring trust estimation model. Performance metrics such as accuracy, precision, recall, and F-measure are calculated under normal conditions and under the injection of attacks like false data injection, booting attack, and node capturing. The proposed behavioral monitoring trust classification model is compared with existing classifiers like Naive Bayes, K-nearest neighbor, Auto Encoder, Random Forest, and Support Vector Machine, and is found to have improved performance. Additional evaluation parameters like execution time, encryption time, storage cost, computational overhead, energy efficiency, and packet drop possibility are also calculated for the proposed model and compared with existing blockchain techniques of Bitcoin, Ethereum, Hyperledger, Direct and indirect trust model, and mutual trust chain based blockchain model. The proposed model achieved an accuracy of 95%, a precision score of 90%, a recall score of 94%, and an F-measure of 94% indicating superior performance.

    Keywords :

    Behavioral Monitoring , Trust , ANFIS , Edge Computing , Blockchain , Naive Bayes , K-nearest neighbor , Auto Encoder , Random Forest , Support Vector Machine

    References

    [1]    Wang, L., Zhu, H., Sun, J., Dai, R., Ma, Q., & Wei, X. (2020). Trust Assessment in Internet of Things Using Blockchain and Machine Learning. Research Square Platform LLC. https://doi.org/10.21203/rs.3.rs-110210/v1.

    [2]    Mohammadi, V., Rahmani, A. M., Darwesh, A. M., & Sahafi, A. (2019). Trust-based recommendation systems in Internet of Things: a systematic literature review. In Human-centric Computing and Information Sciences (Vol. 9, Issue 1). Springer Science and Business Media LLC. https://doi.org/10.1186/s13673-019-0183-8.

    [3]    Mishra, K. N., Bhattacharjee, V., Saket, S., & Mishra, S. P. (2022). Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. In Cluster Computing (Vol. 27, Issue 1, pp. 27–52). Springer Science and Business Media LLC. https://doi.org/10.1007/s10586-022-03813-x.

    [4] Huh, S., Cho, S., & Kim, S. (2017, February). Managing IoT devices using blockchain platform. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 464-467). IEEE.

    [5] Johnson, S., Scarlata, V., Rozas, C., Brickell, E., & Mckeen, F. (2016). Intel software guard extensions: EPID provisioning and attestation services. White Paper, 1(1-10), 119.

    [6] A.S.M. Kayes, W. Rahayu, P. Watters, M. Alazab, T. Dillon and E. Chang, Achieving Security Scalability and Flexibility using Fog-Based Context-Aware Access Control, Future Generation Computer Systems, 107(1) (2020), 307-323.

    [7]    Al-Hasnawi, S. M. Carr, and A. Gupta, Fog-based local and Remote Policy Enforcement for Preserving Data Privacy in the Internet of Things, Internet of Things, 7(1) (2019), 1-15.

    [8]    Bocek, T., Rodrigues, B. B., Strasser, T., & Stiller, B. (2017, May). Blockchains everywhere-a use-case of blockchains in the pharma supply-chain. In 2017 IFIP/IEEE symposium on integrated network and service management (IM) (pp. 772-777). IEEE.

    [9]    Dorri, A., Kanhere, S. S., & Jurdak, R. (2017, April). Towards an optimized blockchain for IoT. In 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI) (pp. 173-178). IEEE.

    [10] Cao, K., Liu, Y., Meng, G., & Sun, Q. (2020). An overview on edge computing research. IEEE Access, 8, 85714-85728.

    [11] Shala, B., Trick, U., Lehmann, A., Ghita, B., & Shiaeles, S. (2020). Blockchain and trust for secure, end-user-based and decentralized IoT service provision. IEEE Access, 8, 119961-119979.Guo, S., Hu, X., Guo, S., Qiu, X., & Qi, F. (2019). Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System. IEEE Transactions on Industrial Informatics, 1–1.

    [12] Christidis, K., & DevetsikIoTis, M. (2016). Blockchains and smart contracts for the internet of things. Ieee Access, 4, 2292-2303.

    [13] Idrees, S. M., Nowostawski, M., Jameel, R., & Mourya, A. K. (2021). Security aspects of blockchain technology intended for industrial applications. Electronics, 10(8), 951.

    [14] Bhushan, B., Sahoo, C., Sinha, P., & Khamparia, A. (2021). Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions. Wireless Networks, 27, 55-90.

    [15] Al-Rakhami, M. S., & Al-Mashari, M. (2021). A blockchain-based trust model for the internet of things supply chain management. Sensors, 21(5), 1759.

    [16] Ali, J., Ali, T., Alsaawy, Y., Khalid, A. S., & Musa, S. (2019, May). Blockchain-based smart-IoT trust zone measurement architecture. In Proceedings of the International Conference on Omni-Layer Intelligent Systems (pp. 152-157).

    [17] Kolokotronis, N., Brotsis, S., Germanos, G., Vassilakis, C., & Shiaeles, S. (2019, July). On blockchain architectures for trust-based collaborative intrusion detection. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 21-28). IEEE.

    [18] Bamakan, S. M. H., Faregh, N., & ZareRavasan, A. (2021). Di-ANFIS: an integrated blockchain–IoT–big data-enabled framework for evaluating service supply chain performance. Journal of Computational Design and Engineering, 8(2), 676-690.

    [19] Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2021, May). A cooperative architecture of data offloading and sharing for smart healthcare with blockchain. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (pp. 1-8). IEEE.

    [20] Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of Internet of Things (IoT) against security threats using cryptographic authentication. The journal of supercomputing, 76, 7081-7106.

    Cite This Article As :
    Jayakumar, D.. , Santhosh, K.. A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System. Fusion: Practice and Applications, vol. , no. , 2025, pp. 38-50. DOI: https://doi.org/10.54216/FPA.170204
    Jayakumar, D. Santhosh, K. (2025). A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System. Fusion: Practice and Applications, (), 38-50. DOI: https://doi.org/10.54216/FPA.170204
    Jayakumar, D.. Santhosh, K.. A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System. Fusion: Practice and Applications , no. (2025): 38-50. DOI: https://doi.org/10.54216/FPA.170204
    Jayakumar, D. , Santhosh, K. (2025) . A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System. Fusion: Practice and Applications , () , 38-50 . DOI: https://doi.org/10.54216/FPA.170204
    Jayakumar D. , Santhosh K. [2025]. A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System. Fusion: Practice and Applications. (): 38-50. DOI: https://doi.org/10.54216/FPA.170204
    Jayakumar, D. Santhosh, K. "A Novel Behavioral Monitoring based Trust Model for enhancing Edge Security using Adaptive Neuro-fuzzy Inference System," Fusion: Practice and Applications, vol. , no. , pp. 38-50, 2025. DOI: https://doi.org/10.54216/FPA.170204