Skip to main content

Advertisement

Log in

Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT)

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Motivated by the recent explosion of interest around the Internet of Things (IoT), this paper is focused on the dynamics of its security. It is a fact that at present, there is a dearth of consolidated and methodical visions for assuring the security of IoT. This owes to its unique characteristics like interdependence of IoT devices and services, device heterogeneity, mobility, affinity to owners, pervasiveness, and unattended nature. The constraints of energy, memory, bandwidth and computability further complicate this picture. The strategies available in the literature today do not entirely consider this intricate nature of IoT environments. Moreover, uncertainty is not adequately acknowledged by the researchers while designing the security procedures for IoT, even though most of the IoT related security problems stem from an uncertain environment. This paper focuses on addressing this uncertainty, along with the other major security issues of IoT. It gives detailed categorization of the attacks in IoT. To this end, a Fuzzy Logic and Fog based Secure Architecture for IoT (FLFSIoT) has been proposed in this paper that works in real-time. In FLFSIoT, fuzzy logic has been used to alleviate the uncertainty of belonging to one crisp cluster of an edge node and for detecting various classical attacks. The Fog supported IoT architecture has been used to make FLFSIoT intrinsically more secure in comparison to the cloud-supported IoT by omitting the latency and other issues. As such, this work feeds the benefits of fuzzy log and fog computing into the carving of a generic solution to the IoT’s security problem. The efficiency of FLFSIoT has been evaluated against the Distributed Denial of Service (DDoS) and Collusion attacks, and it has been observed that it gives more accurate results than the existing benchmarks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig.7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

IDS:

Intrusion detection system

FP:

False positive

FN:

False negative

WSN:

Wireless sensor network

UDP:

User datagram protocol

6LOWPAN:

IPv6 over low power wireless personal area networks

BR:

Border router

6BR:

6LOWPAN BR

MANET:

Mobile adhoc networks

MQTT:

Message queuing telemetry transport (an application layer protocol for IoT)

CMR:

Fraction of connection requests from the publisher

CAMR:

Fraction of subscriber requests received in the broker

DBN:

Deep belief networks

*p:

Pro of the scheme

*c:

Con of the scheme

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syed Rameem Zahra.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zahra, S.R., Chishti, M.A. Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT). J Ambient Intell Human Comput 14, 5903–5927 (2023). https://doi.org/10.1007/s12652-020-02128-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02128-2

Keywords

Navigation