Geetanjali Rathee, Anissa Cheriguene, Chaker Abdelaziz Kerrache, Carlos T. Calafate
{"title":"A Secure and Trusted Communication Solution for Web 3.0 Based on Edge Intelligence","authors":"Geetanjali Rathee, Anissa Cheriguene, Chaker Abdelaziz Kerrache, Carlos T. Calafate","doi":"10.1002/itl2.70007","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The rise of AI has positioned edge computing as a pivotal domain for deploying machine learning technologies, fostering agile processing, and enhancing network robustness and decision-making capabilities. This paper addresses the underexplored aspects of DDoS and phishing attacks, and precise decision-making at network edge devices within blockchain-based frameworks. The contribution lies in proposing an incentive-based security mechanism to divert intruders from genuine routes. Legitimate devices conducting accurate decision-making are rewarded, enticing their participation in identifying false devices. A honeypot intrusion detection system attracts false devices, and real-time trust computation monitors communication devices. This approach is analyzed under security threats and network delays, demonstrating its efficacy compared to existing methods in safeguarding edge computing environments.</p>\n </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 4","pages":""},"PeriodicalIF":0.9000,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The rise of AI has positioned edge computing as a pivotal domain for deploying machine learning technologies, fostering agile processing, and enhancing network robustness and decision-making capabilities. This paper addresses the underexplored aspects of DDoS and phishing attacks, and precise decision-making at network edge devices within blockchain-based frameworks. The contribution lies in proposing an incentive-based security mechanism to divert intruders from genuine routes. Legitimate devices conducting accurate decision-making are rewarded, enticing their participation in identifying false devices. A honeypot intrusion detection system attracts false devices, and real-time trust computation monitors communication devices. This approach is analyzed under security threats and network delays, demonstrating its efficacy compared to existing methods in safeguarding edge computing environments.