Geetanjali Rathee, Anissa Cheriguene, Chaker Abdelaziz Kerrache, Carlos T. Calafate
{"title":"基于边缘智能的Web 3.0安全可信通信解决方案","authors":"Geetanjali Rathee, Anissa Cheriguene, Chaker Abdelaziz Kerrache, Carlos T. Calafate","doi":"10.1002/itl2.70007","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The rise of AI has positioned edge computing as a pivotal domain for deploying machine learning technologies, fostering agile processing, and enhancing network robustness and decision-making capabilities. This paper addresses the underexplored aspects of DDoS and phishing attacks, and precise decision-making at network edge devices within blockchain-based frameworks. The contribution lies in proposing an incentive-based security mechanism to divert intruders from genuine routes. Legitimate devices conducting accurate decision-making are rewarded, enticing their participation in identifying false devices. A honeypot intrusion detection system attracts false devices, and real-time trust computation monitors communication devices. This approach is analyzed under security threats and network delays, demonstrating its efficacy compared to existing methods in safeguarding edge computing environments.</p>\n </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 4","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure and Trusted Communication Solution for Web 3.0 Based on Edge Intelligence\",\"authors\":\"Geetanjali Rathee, Anissa Cheriguene, Chaker Abdelaziz Kerrache, Carlos T. Calafate\",\"doi\":\"10.1002/itl2.70007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The rise of AI has positioned edge computing as a pivotal domain for deploying machine learning technologies, fostering agile processing, and enhancing network robustness and decision-making capabilities. This paper addresses the underexplored aspects of DDoS and phishing attacks, and precise decision-making at network edge devices within blockchain-based frameworks. The contribution lies in proposing an incentive-based security mechanism to divert intruders from genuine routes. Legitimate devices conducting accurate decision-making are rewarded, enticing their participation in identifying false devices. A honeypot intrusion detection system attracts false devices, and real-time trust computation monitors communication devices. This approach is analyzed under security threats and network delays, demonstrating its efficacy compared to existing methods in safeguarding edge computing environments.</p>\\n </div>\",\"PeriodicalId\":100725,\"journal\":{\"name\":\"Internet Technology Letters\",\"volume\":\"8 4\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2025-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet Technology Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
A Secure and Trusted Communication Solution for Web 3.0 Based on Edge Intelligence
The rise of AI has positioned edge computing as a pivotal domain for deploying machine learning technologies, fostering agile processing, and enhancing network robustness and decision-making capabilities. This paper addresses the underexplored aspects of DDoS and phishing attacks, and precise decision-making at network edge devices within blockchain-based frameworks. The contribution lies in proposing an incentive-based security mechanism to divert intruders from genuine routes. Legitimate devices conducting accurate decision-making are rewarded, enticing their participation in identifying false devices. A honeypot intrusion detection system attracts false devices, and real-time trust computation monitors communication devices. This approach is analyzed under security threats and network delays, demonstrating its efficacy compared to existing methods in safeguarding edge computing environments.