Trust-Based Framework for Securing Inter-Fog Communication in Smart City Applications

Authors

  • Faraz Ahmed Crisp Technologies LLC, Cybersecurity researcher. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V5I4P108

Keywords:

Fog Computing, Inter-Fog Communication, Smart Cities, Trust Management, Security Framework, Distributed Systems, IoT

Abstract

The proliferation of smart city technologies has accelerated the deployment of fog computing to support low-latency, real-time services. By processing data closer to the source, fog computing reduces dependence on cloud infrastructures. However, decentralized, peer-to-peer inter-fog communication introduces serious security challenges due to the lack of centralized oversight and the involvement of diverse administrative domains. Traditional perimeter-based security models fall short in such environments. Establishing trust defined as confidence in a node’s reliability, behavior, and compliance is critical for securing fog-based interactions. This paper reviews trust-based frameworks tailored for inter-fog communication, including machine learning-driven evaluators, blockchain-enhanced identity systems, game-theoretic models, and reputation-based mechanisms. We assess their scalability, privacy trade-offs, and operational effectiveness in real-time settings. Key challenges such as trust standardization, cold-start issues, privacy risks in feedback systems, and Sybil or bad-mouthing attacks are examined. In response, we propose a conceptual Trust Evaluation and Enforcement Layer (TEEL) that dynamically assesses trust using hybrid behavioral, cryptographic, and reputational metrics. Our recommendations emphasize adaptive trust recalibration, integration with lightweight security orchestration, support for federated trust across domains, and privacy-by-design principles. Trust, we argue, must evolve from a security feature to a foundational architectural requirement in fog-driven smart cities

References

[1] S. Yi, Z. Qin, and Q. Li, “Security and Privacy Issues of Fog Computing: A Survey,” in Lecture Notes in Computer Science (LNCS), vol. 9677, pp. 685–695, Aug. 2015. doi: 10.1007/978-3-319-21837-3_67. https://www.researchgate.net/publication/299597450_Security_and_Privacy_Issues_of_Fog_Computing_A_Survey

[2] A.-N. Patwary, R. K. Naha, S. Garg, S. K. Battula, M. A. K. Patwary, E. Aghasian, M. B. Amin, A. Mahanti, and M. Gong, "Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control," Electronics, vol. 10, no. 11, p. 1171, May 2021, doi: 10.3390/electronics10101171. https://www.mdpi.com/2079-9292/10/10/1171

[3] X. Liu, Y. Yang, K.-K. R. Choo, and H. Wang, “Security and Privacy Challenges for Internet-of-Things and Fog Computing,” Wireless Communications and Mobile Computing, vol. 2018, Article ID 9373961, 3 pages, Sep. 2018. https://www.researchgate.net/publication/327849591_Security_and_Privacy_Challenges_for_Internet-of-Things_and_Fog_Computing

[4] M. A. Rasheed, J. Saleem, H. Murtaza, H. A. Tanweer, M. A. Rasheed, and M. Ahmed, “A Survey on Fog Computing in IoT,” VFAST Transactions on Software Engineering, vol. 9, no. 4, pp. 68–81, Oct.–Dec. 2021. https://vfast.org/journals/index.php/VTSE/article/view/727/796

[5] Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT Security and Privacy: The Case Study of a Smart Home,” in Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, Mar. 2017, pp. 618–623. doi: 10.1109/PERCOMW.2017.7917634. https://www.researchgate.net/publication/312218574_Blockchain_for_IoT_Security_and_Privacy_The_Case_Study_of_a_Smart_Home

[6] J. Zhang, “Analysis of Security Access Control Systems in Fog Computing Environment,” Journal of Cyber Security and Mobility, vol. 12, no. 5, pp. 653–674, Aug. 2023. https://www.researchgate.net/publication/373098018_Analysis_of_Security_Access_Control_Systems_in_Fog_Computing_Environment

[7] J. Jangid, "Efficient Training Data Caching for Deep Learning in Edge Computing Networks," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 7, no. 5, pp. 337–362, 2020. doi: 10.32628/CSEIT20631113 https://www.researchgate.net/publication/389592482_Efficient_Training_Data_Caching_for_Deep_Learning_in_Edge_Computing_Networks

[8] H. M. Shabbir, H. Abbas, and M. M. Rafique, “A Review on Trust Management in Fog/Edge Computing,” Journal of Information Assurance and Security, vol. 18, no. 6, pp. 112–125, Dec. 2023. https://www.researchgate.net/publication/363633894_A_review_on_trust_management_in_fogedge_computing_Techniques_trends_and_challenges

[9] T. Ibrahim, A. Ghaleb, and H. Otrok, “Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol,” International Journal of Ubiquitous Computing (IJU), vol. 13, no. 1/2, pp. 1–20, Apr. 2022. doi: 10.5121/iju.2022.13201 https://arxiv.org/pdf/2207.03346

[10] R. Das and M. M. Inuwa, “A Review on Fog Computing: Issues, Characteristics, Challenges, and Potential Applications,” Telematics and Informatics Reports, vol. 10, p. 100049, 2023. https://www.sciencedirect.com/science/article/pii/S2772503023000099

[11] D. Shehada, A. Gawanmeh, C. Y. Yeun and M. J. Zemerly, "Fog-based Distributed Trust and Reputation Management System for Internet of Things," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, pp. 8864–8878, Oct. 2022, doi: 10.1016/j.jksuci.2021.10.006. https://www.researchgate.net/publication/355846801_Fog-based_Distributed_Trust_and_Reputation_Management_System_for_Internet_of_Things

[12] S. Kumar, R. Kumar, V. Chang, M. R. Islam, and B. B. Gupta, “A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time, Security Issues and Solutions,” Journal of Network and Computer Applications, vol. 199, p. 103324, Jul. 2022 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10179927

[13] P. D. Singh and K. D. Singh, “Security and Privacy in Fog/Cloud-based IoT Systems for AI and Robotics,” EAI Endorsed Transactions on AI and Robotics, vol. 2, no. 1, pp. 1–6, Aug. 2023, doi: 10.4108/airo.3616. https://www.researchgate.net/publication/373460063_Security_and_Privacy_in_FogCloud-based_IoT_Systems_for_AI_and_Robotics

[14] Ghosh, S. K. Das, and N. Mukherjee, “Blockchain-Based Reputation Management for Task Offloading in Micro-Level Vehicular Fog Network,” Computer Communications, vol. 186, pp. 190–202, May 2022. doi: 10.1016/j.comcom.2022.04.004 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9046146

[15] M. Jumani, A. B. Qureshi, and M. K. Khan, “Fog Computing Security: A Review of Current Challenges and Solutions,” Security and Privacy, vol. 6, no. 1, pp. e239, 2023. doi: 10.1002/spy2.239 https://www.researchgate.net/publication/369417246_Fog_computing_security_A_review#:~:text=Security%3A%20Fog%20computing%20enhances%20the,of%20unauthorized%20access%20and%20theft.&text=may%20have%20limited%20processing%20power%2C%20storage%2C%20and%20connectivity.

[16] M. Ghaleb and F. Azzedin, “Trust-Aware Fog-Based IoT Environments: Artificial Reasoning Approach,” Applied Sciences, vol. 13, no. 6, p. 3665, Mar. 2023. doi: 10.3390/app13063665. https://www.mdpi.com/2076-3417/13/6/3665

[17] Y. Hussain, H. Zhiqi, M. A. Akbar, A. Alsanad, A. A. A. Alsanad, A. Nawaz, I. A. Khan, and Z. U. Khan, “Context-Aware Trust and Reputation Model for Fog-Based IoT,” IEEE Access, vol. 8, pp. 22283–22294, Feb. 2020. doi: 10.1109/ACCESS.2020.2972968 https://www.researchgate.net/publication/339159644_Context-Aware_Trust_and_Reputation_Model_for_Fog-Based_IoT

[18] M. I. Younas, N. A. Saeed, M. K. Khan, and A. M. Khan, “A Survey on Trustworthiness for the Internet of Things,” IEEE Access, vol. 9, pp. 116959–116987, Aug. 2021. doi: 10.1109/ACCESS.2021.3104935 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9380363

[19] F. Aliyu, T. Sheltami, A. Mahmoud, L. Al-Awami, and A. Yasar, “Detecting Man-in-the-Middle Attack in Fog Computing for Social Media,” Computer Materials & Continua, vol. 67, no. 2, pp. 2021–2037, 2021. doi: 10.32604/cmc.2021.016938 https://www.techscience.com/cmc/v69n1/42741

[20] M. A. Naeem, Y. B. Zikria, R. Ali, U. Tariq, Y. Meng, and A. K. Bashir, “Cache in Fog Computing: Design, Concepts, Contributions, and Security Issues in Machine Learning Prospective,” Internet of Things, vol. 18, p. 100538, Dec. 2022. doi: 10.1016/j.iot.2022.100538: https://www.sciencedirect.com/science/article/pii/S2352864822001651

[21] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” in Proc. 3rd Int. Symp. Information Processing in Sensor Networks (IPSN), Berkeley, CA, USA, Apr. 2004, pp. 259–268. doi: 10.1145/984622.984660 https://dawnsong.io/papers/sybil.pdf

[22] Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, “A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things,” arXiv preprint, arXiv:2008.03252v1, Aug. 2020. https://arxiv.org/abs/2008.03252 https://arxiv.org/pdf/2008.03252

[23] Rehman, K. A. Awan, I. Ud Din, A. Almogren, and M. Alabdulkareem, “FogTrust: Fog-Integrated Multi-Leveled Trust Management Mechanism for Internet of Things,” Technologies, vol. 11, no. 1, p. 27, Feb. 2023. doi: 10.3390/technologies11010027 https://www.mdpi.com/2227-7080/11/1/27

[24] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “Fog Computing and the Internet of Things: A Review,” Future Generation Computer Systems, vol. 89, pp. 1–15, Dec. 2018. doi: 10.1016/j.future.2018.06.046 https://www.researchgate.net/publication/324280213_Fog_Computing_and_the_Internet_of_Things_A_Review

[25] Junejo, M. A. Shah, M. A. Naeem, and M. I. Khan, “Trust Management System in Fog for Cyber-Physical Systems,” EAI Endorsed Transactions on Security and Safety, vol. 6, no. 22, pp. 1–8, Feb. 2020. doi: 10.4108/eai.3-12-2019.162306 https://www.researchgate.net/publication/337752372_Trustee_A_Trust_Management_System_for_Fog-Enabled_Cyber_Physical_Systems

[26] P. Radomirović, D. De Roure, K. Page, J. R. C. Nurse, R. Mantilla Montalvo, O. Santos, L. T. Maldonado, and P. Burnap, “Cyber Risk at the Edge: Current and Future Trends on Cyber Risk Analytics and Artificial Intelligence in the Industrial Internet of Things and Industry 4.0 Supply Chains,” Cybersecurity, vol. 3, no. 1, p. 3, Jan. 2020. doi: 10.1186/s42400-020-00052-8 https://www.researchgate.net/publication/332207682_Cyber_Risk_at_the_Edge_Current_and_future_trends_on_Cyber_Risk_Analytics_and_Artificial_Intelligence_in_the_Industrial_Internet_of_Things_and_Industry_40_Supply_Chains

[27] H. Sun, B. Liu, Y. Zhang, and C. Wang, “Machine Learning Empowered Trust Evaluation Method for Securing Intelligent Edge Computing in IoT,” Journal of Cloud Computing, vol. 11, no. 1, pp. 1–20, Feb. 2022. doi: 10.1186/s13677-022-00285-0 https://www.researchgate.net/publication/351296822_Machine_Learning_Empowered_Trust_Evaluation_Method_for_IoT_Devices

[28] D. Xu, Y. Lu, and L. Li, “Embedding Blockchain Technology Into IoT for Security: A Survey,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10452–10473, Jul. 2021. doi: 10.1109/JIOT.2021.3079484 https://e-tarjome.com/storage/panel/fileuploads/2021-07-28/1627452809_E15540.pdf

[29] F. Ahmed, “Cybersecurity Policy Frameworks for AI in Government: Balancing National Security and Privacy Concerns,” International Journal of Multidisciplinary on Science and Management, vol. 1, no. 4, pp. 43–53, 2024. https://www.ijmsm.org/volume1-issue4/IJMSM-V1I4P107.pdf

[30] F. Ahmed, “Cloud Security Posture Management (CSPM): Automating Security Policy Enforcement in Cloud Environments,” ESP International Journal of Advancements in Computational Technology (ESP-IJACT), vol. 1, no. 3, pp. 157–166, 2023. https://philpapers.org/archive/AHMCSP.pdf

[31] J. Jangid, S. Dixit, S. Malhotra, M. Saqib, F. Yashu, and D. Mehta, “Enhancing Security and Efficiency in Wireless Mobile Networks Through Blockchain,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 4, pp. 958–969, 2023. https://ijisae.org/index.php/IJISAE/article/view/7309

Downloads

Published

2024-12-30

Issue

Section

Articles

How to Cite

1.
Ahmed F. Trust-Based Framework for Securing Inter-Fog Communication in Smart City Applications. IJERET [Internet]. 2024 Dec. 30 [cited 2025 Oct. 28];5(4):74-87. Available from: https://ijeret.org/index.php/ijeret/article/view/199