A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development

Subhranshu Sekhar Tripathy , Sujit Bebortta , Mazin Abed Mohammed , Muhammet Deveci , Haydar Abdulameer Marhoon , Radek Martinek

›› 2026, Vol. 12 ›› Issue (1) : 165 -179.

PDF
›› 2026, Vol. 12 ›› Issue (1) :165 -179. DOI: 10.1016/j.dcan.2024.12.008
Special issue on cyber-physical systems for intelligent transportation and smart cities
research-article

A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development

Author information +
History +
PDF

Abstract

Practical applications of smart cities and the Internet of Things (IoT) have multiplied, posing many difficulties in network performance, dependability, and security. Concerns of accessibility, reliability, sustainability, and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems. Fog computing offers a foundation for various applications, including cognitive support, health and social services, intelligent transportation systems, and pervasive computing and communications. Fog computing can help enhance these apps’ productivity and lower the end-to-end delay experienced by such time-sensitive applications. In this research, we propose a reliable and secure service delivery strategy at the network edge for smart cities. To improve the availability and dependability, along with the security of smart city applications, the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system. Simulation findings suggest a reduction of 40.3% in the delay incurred by each service request for highly dense areas and 60.6% for moderately dense environments. Furthermore, the system has low false-negative rates and high detection and accuracy rates, decreasing service requests 2%.

Keywords

Security / Reliability / Trustworthy computing / Resource provisioning / Threat detection / Fog computing / Internet of things

Cite this article

Download citation ▾
Subhranshu Sekhar Tripathy, Sujit Bebortta, Mazin Abed Mohammed, Muhammet Deveci, Haydar Abdulameer Marhoon, Radek Martinek. A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development. , 2026, 12(1): 165-179 DOI:10.1016/j.dcan.2024.12.008

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Subhranshu Sekhar Tripathy: Writing-review & editing, Soft-ware, Formal analysis. Sujit Bebortta: Writing-review & editing, Supervision, Methodology. Mazin Abed Mohammed: Writing-re-view & editing, Project administration, Methodology, Formal analysis. Muhammet Deveci: Visualization, Project administration, Methodol-ogy. Haydar Abdulameer Marhoon: Formal analysis, Data curation.

Funding

This article was co-funded by the European Union under the REFRESH-Research Excellence For REgion Sustainability and High-tech Industries project number CZ.10.03.01/00/22_003/0000048 via the Operational Programme Just Transition. Also, this work was supported by the Ministry of Education, Youth and Sports of the Czech Republic con-ducted by VSB-Technical University of Ostrava, Czechia, under Grants SP2025/021 and SP2025/039

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

F. Al-Turjman, A. Malekloo, Smart parking in iot-enabled cities: a survey, Sustain. Cities Soc. 49 (2019) 101608.

[2]

I. Al Ridhawi, S. Otoum, M. Aloqaily, Y. Jararweh, T. Baker, Providing secure and reliable communication for next generation networks in smart cities, Sustain. Cities Soc. 56 (2020) 102080.

[3]

L. Atzori, A. Iera, G. Morabito, The Internet of things: a survey, Comput. Netw. 54 (15) (2010) 2787-2805.

[4]

H. Ning, H. Liu, J. Ma, L.T. Yang, R. Huang, Cybermatics: cyber-physical-social-thinking hyperspace based science and technology, Future Gener. Comput. Syst. 56 (2016) 504-522.

[5]

M. Suárez-Albela, P. Fraga-Lamas, T.M. Fernández-Caramés, A practical evaluation on rsa and ecc-based cipher suites for iot high-security energy-efficient fog and mist computing devices, Sensors 18 (11) (2018) 3868.

[6]

F. Bonomi, R. Milito, J. Zhu, S. Addepalli,Fog computing and its role in the Internet of things, in:Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13-16.

[7]

C. Zuo, J. Shao, G. Wei, M. Xie, M. Ji, Cca-secure abe with outsourced decryption for fog computing, Future Gener. Comput. Syst. 78 (2018) 730-738.

[8]

E.M. Dogo, A.F. Salami, C.O. Aigbavboa, T. Nkonyana,Taking cloud computing to the extreme edge: a review of mist computing for smart cities and industry 4.0 in Africa, in: Edge Computing: from Hype to Reality, 2019, pp. 107-132.

[9]

J.-S. Preden, Evolution of mist computing from fog and cloud computing, THIINECT White Paper, 2016, pp. 1-4.

[10]

J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: 2007 IEEE Symposium on Security and Privacy (SP’07), IEEE, 2007, pp. 321-334.

[11]

A. Alrawais, A. Alhothaily, C. Hu, X. Xing, X. Cheng, An attribute-based encryption scheme to secure fog communications, IEEE Access 5 (2017) 9131-9138.

[12]

R. Ostrovsky, A. Sahai, B. Waters,Attribute-based encryption with non-monotonic access structures, in:Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 195-203.

[13]

A. Lewko, B. Waters, Unbounded hibe and attribute-based encryption, in: Annual In-ternational Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2011, pp. 547-567.

[14]

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, B. Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,in:Advances in Cryptology-EUROCRYPT 2010: 29 th Annual International Confer-ence on the Theory and Applications of Cryptographic Techniques,in: Proceedings, vol. 29, Springer, 2010, pp. 62-91.

[15]

Z.K. Mohammed, M.A. Mohammed, K.H. Abdulkareem, D.A. Zebari, A. Lakhan, H.A. Marhoon, J. Nedoma, R. Martinek, A metaverse framework for iot-based remote patient monitoring and virtual consultations using aes-256 encryption, Appl. Soft Comput. 158 (2024) 111588.

[16]

L. Cheung, C. Newport,Provably secure ciphertext policy abe, in:Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 456-465.

[17]

C. Perera, Y. Qin, J.C. Estrella, S. Reiff-Marganiec, A.V. Vasilakos, Fog computing for sustainable smart cities: a survey, ACM Comput. Surv. 50 (3) (2017) 1-43.

[18]

N. Davies, N. Taft, M. Satyanarayanan, S. Clinch, B. Amos, Privacy mediators: help-ing iot cross the chasm,in: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016, pp. 39-44.

[19]

Y. Jararweh, S. Otoum, I. Al Ridhawi, Trustworthy and sustainable smart city ser-vices at the edge, Sustain. Cities Soc. 62 (2020) 102394.

[20]

Y. Jararweh, M. Al-Ayyoub, E. Benkhelifa, et al., An experimental framework for future smart cities using data fusion and software defined systems: the case of envi-ronmental monitoring for smart healthcare, Future Gener. Comput. Syst. 107 (2020) 883-897.

[21]

M.A. Mohammed, M.J. Abdulhasan, N.M. Kumar, K.H. Abdulkareem, S.A. Mostafa, M.S. Maashi, L.S. Khalid, H.S. Abdulaali, S.S. Chopra, Automated waste-sorting and recycling classification using artificial neural network and features fusion: a digital-enabled circular economy vision for smart cities, Multimed. Tools Appl. 82 (25) (2023) 39617-39632.

[22]

A. Belmeziti, F. Cherqui, B. Kaufmann, Improving the multi-functionality of urban green spaces: relations between components of green spaces and urban services, Sustain. Cities Soc. 43 (2018) 1-10.

[23]

Z. Ullah, F. Al-Turjman, L. Mostarda, R. Gagliardi, Applications of artificial intelli-gence and machine learning in smart cities, Comput. Commun. 154 (2020) 313-323.

[24]

T.X. Tran, A. Hajisami, P. Pandey, D. Pompili, Collaborative mobile edge comput-ing in 5g networks: new paradigms, scenarios, and challenges, IEEE Commun. Mag. 55 (4) (2017) 54-61.

[25]

M. Aloqaily, I. Al Ridhawi, H.B. Salameh, Y. Jararweh, Data and service management in densely crowded environments: challenges, opportunities, and recent develop-ments, IEEE Commun. Mag. 57 (4) (2019) 81-87.

[26]

T. Wang, L. Qiu, A.K. Sangaiah, A. Liu, M.Z.A. Bhuiyan, Y. Ma, Edge-computing-based trustworthy data collection model in the Internet of things, IEEE Internet Things J. 7 (5) (2020) 4218-4227.

[27]

M. Kumar, A. Singh,Probabilistic data structures in smart city: survey, applications, challenges, and research directions, J. Ambient Intell. Smart Environ. 14 (Preprint) ( 2022) 1-56.

[28]

N. Farjana, S. Roy, M.J.N. Mahi, M. Whaiduzzaman,An identity-based encryption scheme for data security in fog computing, in:Proceedings of International Joint Conference on Computational Intelligence: IJCCI 2018, Springer, 2020, pp. 215-226.

[29]

C. Zhou, A. Fu, S. Yu, W. Yang, H. Wang, Y. Zhang, Privacy-preserving federated learning in fog computing, IEEE Internet Things J. 7 (11) (2020) 10782-10793.

[30]

M. Ahmad, M.B. Amin, S. Hussain, B.H. Kang, T. Cheong, S. Lee, Health fog: a novel framework for health and wellness applications, J. Supercomput. 72 (2016) 3677-3695.

[31]

I. Martinez, A.S. Hafid, A. Jarray, Design, resource management, and evaluation of fog computing systems: a survey, IEEE Internet Things J. 8 (4) (2020) 2494-2516.

[32]

H. Wang, Z. Wang, J. Domingo-Ferrer, Anonymous and secure aggregation scheme in fog-based public cloud computing, Future Gener. Comput. Syst. 78 (2018) 712-719.

[33]

S. Zahra, M. Alam, Q. Javaid, A. Wahid, N. Javaid, S.U.R. Malik, M.K. Khan, Fog computing over iot: a secure deployment and formal verification, IEEE Access 5 (2017) 27132-27144.

[34]

L. Zhang, J. Li, Enabling robust and privacy-preserving resource allocation in fog computing, IEEE Access 6 (2018) 50384-50393.

[35]

K. Fan, J. Wang, X. Wang, H. Li, Y. Yang, A secure and verifiable outsourced access control scheme in fog-cloud computing, Sensors 17 (7) (2017) 1695.

[36]

F. Wang, J. Wang, W. Yang, Efficient incremental authentication for the updated data in fog computing, Future Gener. Comput. Syst. 114 (2021) 130-137.

[37]

W. Abdul, Z. Ali, S. Ghouzali, B. Alfawaz, G. Muhammad, M.S. Hossain, Biometric security through visual encryption for fog edge computing, IEEE Access 5 (2017) 5531-5538.

[38]

T.-Y. Wu, Z. Lee, L. Yang, J.-N. Luo, R. Tso, Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks, J. Supercomput. 77 (2021) 6992-7020.

[39]

Y. Jiang, W. Susilo, Y. Mu, F. Guo, Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing, Future Gener. Comput. Syst. 78 (2018) 720-729.

[40]

A.D.A. Dawar, Enhancing wireless security and privacy: a 2-way identity authenti-cation method for 5g networks, Int. J. Math. Stat. Comput. Sci. 2 (2024) 183-198.

[41]

T. Braun, B.C. Fung, F. Iqbal, B. Shah, Security and privacy challenges in smart cities, Sustain. Cities Soc. 39 (2018) 499-507.

[42]

S. Jegadeesan, M. Azees, P.M. Kumar, G. Manogaran, N. Chilamkurti, R. Varathara- jan, C.-H. Hsu, An efficient anonymous mutual authentication technique for provid-ing secure communication in mobile cloud computing for smart city applications, Sustain. Cities Soc. 49 (2019) 101522.

[43]

S.S. Tripathy, S. Bebortta, T.R. Gadekallu,Sustainable fog-assisted intelligent moni-toring framework for consumer electronics in industry 5.0 applications, IEEE Trans. Consum. Electron. 70 (1) (2024) 1501-1510.

[44]

N. Moustafa, J. Slay, Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set), in: 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1-6.

[45]

Y. Jararweh, M. Jarrah, Z. Alshara, M.N. Alsaleh, M. Al-Ayyoub, et al., Cloudexp: a comprehensive cloud computing experimental framework, Simul. Model. Pract. Theory 49 (2014) 180-192.

[46]

S. Bebortta, T. Panda, S.K. Singh, An intelligent hybrid intrusion detection system for Internet of things-based applications, in: 2023 International Conference on Network, Multimedia and Information Technology (NMITCON), IEEE, 2023, pp. 01-06.

[47]

G.L. Stavrinides, H.D. Karatza, Security, cost and energy aware scheduling of real-time iot workflows in a mist computing environment, Inf. Syst. Front. (2022) 1-19.

[48]

G.L. Stavrinides, H.D. Karatza, An energy-efficient, qos-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing sys-tems utilizing dvfs and approximate computations, Future Gener. Comput. Syst. 96 (2019) 216-226.

[49]

S.S. Tripathy, A.L. Imoize, M. Rath, N. Tripathy, S. Bebortta, C.-C. Lee, T.-Y. Chen, S. Ojo, J. Isabona, S.K. Pani, A novel edge-computing-based framework for an intel-ligent smart healthcare system in smart cities, Sustainability 15 (1) (2022) 735.

[50]

S.S. Tripathy, M. Rath, N. Tripathy, D.S. Roy, J.S.A. Francis, S. Bebortta, An intelli-gent health care system in fog platform with optimized performance, Sustainability 15 (3) (2023) 1862.

[51]

S.S. Tripathy, N. Tripathy, M. Rath, A. Pati, A. Panigrahi, M. Dash, Smart farming based on deep learning approaches, in: 2022 2nd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (OD-ICON), IEEE, 2022, pp. 1-5.

[52]

S. Bebortta, S.K. Singh, An adaptive machine learning-based threat detection frame-work for industrial communication networks, in: 2021 10th IEEE International Con-ference on Communication Systems and Network Technologies (CSNT), IEEE, 2021, pp. 527-532.

[53]

S. Bebortta, S.K. Singh,An opportunistic ensemble learning framework for network traffic classification in iot environments, in:Proceedings of the Seventh Interna-tional Conference on Mathematics and Computing: ICMC 2021, Springer, 2022, pp. 473-484.

[54]

S. Bebortta, S.S. Tripathy, U.M. Modibbo, I. Ali, An optimal fog-cloud offloading framework for big data optimization in heterogeneous iot networks, Decis. Anal. J. 8 (2023) 100295.

[55]

S. Bebortta, S.S. Tripathy, S. Basheer, C.L. Chowdhary, Deepmist: toward deep learn-ing assisted mist computing framework for managing healthcare big data, IEEE Access 11 (2023) 42485-42496.

[56]

F. Aliyu, T. Sheltami, M. Deriche, N. Nasser, Human immune-based intrusion de-tection and prevention system for fog computing, J. Netw. Syst. Manag. 30 (2022) 1-27.

[57]

A. Abohamama, A. El-Ghamry, E. Hamouda, Real-time task scheduling algorithm for iot-based applications in the cloud-fog environment, J. Netw. Syst. Manag. 30 (4) (2022) 54.

[58]

J.H. Corrêa, P.M. Ciarelli, M.R. Ribeiro, R.S. Villaça, Ml-based ddos detection and identification using native cloud telemetry macroscopic monitoring, J. Netw. Syst. Manag. 29 (2021) 1-28.

[59]

P. Singh, R. Singh, Energy-efficient delay-aware task offloading in fog-cloud com-puting system for iot sensor applications, J. Netw. Syst. Manag. 30 (2022) 1-25.

PDF

10

Accesses

0

Citation

Detail

Sections
Recommended

/