Dynamic Trust Evaluation and Resilience Assessment in Edge Computing Networks

Authors

  • Oleksandr Kuznetsov
  • Iryna Lysenko
  • Dmytro Prokopovych-Tkachenko
  • Yuliia Ulianovska
  • Valerii Bushkov

DOI:

https://doi.org/10.47839/ijc.24.2.4005

Keywords:

Edge Computing, Trust Management, Network Resilience, Dynamic Trust Propagation, Attack Detection, Security Frameworks, IoT Networks, Adversarial Scenarios, Spatial Propagation, Edge Security

Abstract

Cloud computing has become the cornerstone of low-latency and resource-efficient processing in distributed systems, particularly for applications such as the Internet of Things (IoT) and autonomous systems. However, these edge networks present significant challenges in trust and security management due to their inherently decentralized nature. This paper addresses this challenge by presenting a novel dynamic trust evaluation framework. The proposed framework models the spatial and temporal evolution of edge networks over time. It incorporates attack-specific impact analysis and introduces new trust propagation mechanisms that account for the cascading effects of security events. Additionally, a comprehensive set of metrics is developed to evaluate detection rates, average trust levels, and network resilience, assessing performance against various attack scenarios. The framework is designed with a modular architecture, and its implementation has been tested in simulated environments. Results demonstrate that the proposed framework can maintain high detection accuracy with minimal trust degradation, even in the presence of severe attacks occurring at high frequencies. It outperforms existing state-of-the-art methods in terms of adaptability and the fine-grained modeling of trust dynamics.

References

M. Ergen et al., “Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond,” ICT Express, vol. 10, issue 5, pp. 1151-1173, 2024, https://doi.org/10.1016/j.icte.2024.08.007.

M. Laroui, B. Nour, H. Moungla, M. A. Cherif, H. Afifi, and M. Guizani, “Edge and fog computing for IoT: A survey on current research activities & future directions,” Computer Communications, vol. 180, pp. 210–231, 2021, https://doi.org/10.1016/j.comcom.2021.09.003.

T. Nguyen, H. Nguyen, and T. Nguyen Gia, “Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications,” Journal of Network and Computer Applications, vol. 226, p. 103884, 2024, https://doi.org/10.1016/j.jnca.2024.103884.

O. Kuznetsov, E. Frontoni, N. Kryvinska, S. Volodymyr, and T. Smirnova, “Harnessing edge computing for real-time cybersecurity in healthcare systems,” in Cybersecurity in Emerging Healthcare Systems, IET Digital Library, 2024, pp. 471–508. https://doi.org/10.1049/PBHE064E_ch16.

S. E. Hassanin, “How edge computing systems lower cybersecurity risk in healthcare while enhancing data access,” Schneider Electric Blog. [Online]. Available at: https://blog.se.com/buildings/healthcare/2022/09/14/how-edge-computing-lower-cybersecurity-risk-healthcare-data-access/

K. Dissanayake, P. Somarathne, U. Fernando, D. Pathmasiri, C. Liyanapathirana, and Dr. L. Rupasinghe, “‘Trust Pass’ - Blockchain-based trusted digital identity platform towards digital transformation,” Proceedings of the 2021 2nd International Informatics and Software Engineering Conference (IISEC), Dec. 2021, pp. 1–6. https://doi.org/10.1109/IISEC54230.2021.9672336.

C. Edge and R. Trouton, “Identity and device trust,” in Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs, C. Edge and R. Trouton, Eds., Berkeley, CA: Apress, 2023, pp. 637–705. https://doi.org/10.1007/978-1-4842-9156-6_12.

S. T. Siddiqui, M. O. Ahmad, A. Siddiqui, H. Khan, M. R. Khan, and A. H. Alsabhan, “IoT edge and fog computing architecture for educational systems in universities,” Proceedings of the 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET), Dec. 2022, pp. 1–6. https://doi.org/10.1109/CCET56606.2022.10079946.

M. Pawlicki, A. Pawlicka, R. Kozik, and M. Choraś, “The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT,” Neurocomputing, vol. 551, p. 126533, 2023, https://doi.org/10.1016/j.neucom.2023.126533.

R. Uddin, S. A. P. Kumar, and V. Chamola, “Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions,” Ad Hoc Networks, vol. 152, p. 103322, 2024, https://doi.org/10.1016/j.adhoc.2023.103322.

D. George, “Method and apparatus for decentralized management of trusted data on trustless networks,” WO 2022/178421 A1, Feb. 22, 2022 [Online]. Available at: https://lens.org/192-349-245-292-457.

O. Kuznetsov, E. Frontoni, N. Kryvinska, D. Prokopovych-Tkachenko, and B. Khruskov, “Adaptive cybersecurity: AI-driven threat intelligence in healthcare systems,” in Cybersecurity in Emerging Healthcare Systems, IET Digital Library, 2024, pp. 75–106. https://doi.org/10.1049/PBHE064E_ch3.

O. Kuznetsov, E. Frontoni, N. Kryvinska, O. Smirnov, and A. Hrebeniuk, “Smart contracts for automated compliance in healthcare cybersecurity,” in Cybersecurity in Emerging Healthcare Systems, IET Digital Library, 2024, pp. 263–303. https://doi.org/10.1049/PBHE064E_ch9.

B. Ali, M. A. Gregory, S. Li, and O. A. Dib, “Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing,” Computer Networks, vol. 241, p. 110197, 2024, https://doi.org/10.1016/j.comnet.2024.110197.

A. Almalawi et al., “Enhancing security in smart healthcare systems: Using intelligent edge computing with a novel Salp Swarm Optimization and radial basis neural network algorithm,” Heliyon, vol. 10, no. 13, p. e33792, 2024, https://doi.org/10.1016/j.heliyon.2024.e33792.

K. Baranitharan et al., “A collaborative and adaptive cyber défense strategic assessment for healthcare networks using edge computing,” Healthcare Analytics, vol. 3, p. 100184, 2023, https://doi.org/10.1016/j.health.2023.100184.

M. N. Halgamuge and D. Niyato, “Adaptive edge security framework for dynamic IoT security policies in diverse environments,” Computers & Security, vol. 148, p. 104128, 2025, https://doi.org/10.1016/j.cose.2024.104128.

M. Xu, S. Liu, and X. Li, “Network security situation assessment and prediction method based on multimodal transformation in edge computing,” Computer Communications, vol. 215, pp. 103–111, 2024, https://doi.org/10.1016/j.comcom.2023.12.014.

H. Zhang, J. Wang, H. Zhang, and C. Bu, “Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing,” Future Generation Computer Systems, vol. 151, pp. 152–161, 2024, https://doi.org/10.1016/j.future.2023.09.016.

N. Kaur, “A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions,” Computer Science Review, vol. 54, p. 100688, 2024, https://doi.org/10.1016/j.cosrev.2024.100688.

H. J. Damsgaard et al., “Adaptive approximate computing in edge AI and IoT applications: A review,” Journal of Systems Architecture, vol. 150, p. 103114, 2024, https://doi.org/10.1016/j.sysarc.2024.103114.

Z. Li, H. Yu, G. Fan, Q. Tang, J. Zhang, and L. Chen, “Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing,” Computer Communications, vol. 211, pp. 119–133, 2023, https://doi.org/10.1016/j.comcom.2023.08.023.

M. Ahmed et al., “A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges,” Computer Science Review, vol. 54, p. 100668, 2024, https://doi.org/10.1016/j.cosrev.2024.100668.

R. Akkaoui, X. Hei, and W. Cheng, “EdgeMediChain: A hybrid edge blockchain-based framework for health data exchange,” IEEE Access, vol. 8, pp. 113467–113486, 2020, https://doi.org/10.1109/ACCESS.2020.3003575.

L. Bergs et al., “Edge computing framework for enhanced robotic adaptivity in line-less mobile assembly systems,” Procedia CIRP, vol. 127, pp. 26–31, 2024, https://doi.org/10.1016/j.procir.2024.07.006.

Downloads

Published

2025-07-07

How to Cite

Kuznetsov, O., Lysenko, I., Prokopovych-Tkachenko, D., Ulianovska, Y., & Bushkov, V. (2025). Dynamic Trust Evaluation and Resilience Assessment in Edge Computing Networks. International Journal of Computing, 24(2), 223-232. https://doi.org/10.47839/ijc.24.2.4005

Issue

Section

Articles