<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Shruti, S. Rani, M. Shabaz, A.K. Dutta, E.A. Ahmed, Enhancing privacy and security in IoT-
based smart grid system using encryption-based fog computing, Alexandria Engineering
Journal</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Trust-Based Security Architecture for Edge Computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kuznetsov</string-name>
          <email>oleksandr.kuznetsov@uniecampus.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emanuele Frontoni</string-name>
          <email>emanuele.frontoni@unimc.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yelyzaveta Kuznetsova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Smirnov</string-name>
          <email>dr.SmirnovOA@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Illarion Moskovchenko</string-name>
          <email>illarion_moskovchenko@ukr.net</email>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information and Communication Systems Security, School of Computer Sciences, V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody Sq., 61022 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Political Sciences, Communication and International Relations, University of Macerata</institution>
          ,
          <addr-line>Via Crescimbeni, 30/32, 62100 Macerata</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Theoretical and Applied Sciences, eCampus University</institution>
          ,
          <addr-line>Via Isimbardi 10, Novedrate (CO), 22060</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Department of cyber security and software, Central Ukrainian National Technical University</institution>
          ,
          <addr-line>8</addr-line>
          ,
          <institution>University Ave</institution>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Department of mathematical and software of automated control systems, Faculty of automated control systems and ground support for aviation flights, Ivan Kozhedub Kharkiv National Air Force University</institution>
          ,
          <addr-line>Sumska str., 77/79, Kharkiv, 61023</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Kropyvnytskyi</institution>
          ,
          <addr-line>25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>102</volume>
      <issue>2024</issue>
      <fpage>227</fpage>
      <lpage>241</lpage>
      <abstract>
        <p>This paper presents a comprehensive experimental study of a novel trust-based security architecture for edge computing environments. We introduce an adaptive security framework that combines dynamic trust evaluation with decentralized decision-making mechanisms to enhance threat detection and system resilience. Through extensive simulation experiments, we evaluate the architecture's performance across various network configurations, ranging from 20 to 100 nodes, with different operational parameters and security event patterns. The simulation framework implements a sophisticated spatial distribution model for edge nodes, incorporating computational constraints, memory limitations, and communication boundaries typical of edge computing environments. Our results demonstrate that the proposed architecture achieves an 83.0% threat detection rate while maintaining network resilience at 95.6%, significantly exceeding baseline security requirements. The trust management mechanism demonstrates robust adaptation to security events, maintaining average trust scores of 78.6% despite active security incidents. We provide detailed analysis of system behavior under various attack scenarios, including intrusion attempts, data leaks, DDoS attacks, and authentication failures. The architecture shows exceptional scalability characteristics, with improved detection rates and trust stability in larger network configurations. Performance metrics reveal consistent achievement above target thresholds across all evaluated dimensions, with minimum trust levels maintaining a 7.2 percentage point margin above requirements. Our findings provide empirical validation of the architecture's effectiveness while offering practical insights into deployment considerations for edge computing security. The study contributes to the field by establishing quantitative benchmarks for security performance in edge environments and demonstrating the viability of trust-based security mechanisms for distributed systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;edge computing security</kwd>
        <kwd>trust evolution simulation</kwd>
        <kwd>security architecture evaluation</kwd>
        <kwd>dynamic trust management</kwd>
        <kwd>attack detection mechanisms</kwd>
        <kwd>network resilience analysis</kwd>
        <kwd>security performance metrics</kwd>
        <kwd>distributed security systems</kwd>
        <kwd>adaptive security framework</kwd>
        <kwd>edge computing simulation 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Edge computing represents a fundamental transformation in distributed system architectures,
shifting computational resources closer to data sources and end devices [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. This paradigm has
emerged as a critical enabler for latency-sensitive applications and real-time data processing,
particularly in domains such as Industrial IoT, smart cities, and healthcare systems [
        <xref ref-type="bibr" rid="ref3 ref4">3,4</xref>
        ]. However,
the distributed nature of edge computing introduces complex security challenges that traditional
centralized security approaches fail to address adequately [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Recent industry analyses project that edge devices will generate over 79.4 ZB of data by 2025,
with approximately 75% of enterprise data being processed at the edge [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This massive
decentralization of computation creates unprecedented security vulnerabilities. Edge nodes often
operate in untrusted environments, face resource constraints, and must handle dynamic network
conditions while maintaining robust security guarantees. These challenges are compounded by the
heterogeneous nature of edge devices and their diverse operational requirements.
      </p>
      <p>
        Traditional security architectures, designed for centralized cloud environments, prove inadequate
in edge computing scenarios for several reasons [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. First, they typically assume stable network
connectivity and abundant computational resources, assumptions that rarely hold in edge
environments. Second, they often rely on centralized security decision-making, which introduces
unacceptable latencies and creates single points of failure. Third, they lack the flexibility to adapt to
the dynamic trust relationships and varying security requirements characteristic of edge
deployments.
      </p>
      <p>This paper presents a comprehensive evaluation of an adaptive security architecture designed
specifically for edge computing environments. Our approach incorporates trust-based security
management and decentralized decision-making mechanisms to address the unique challenges of
edge security. Through extensive simulation and analysis, we demonstrate the architecture's
effectiveness in maintaining robust security while adapting to varying network scales and
operational conditions.</p>
      <p>The primary contributions of this work include:
•
•
•</p>
      <p>First, we develop a detailed system model that captures the essential characteristics of edge
computing security, incorporating both spatial and temporal aspects of security dynamics.
This model provides a foundation for analyzing security mechanism effectiveness while
maintaining realistic operational constraints.</p>
      <p>Second, we present comprehensive experimental validation of our security architecture
across different network scales, ranging from 20 to 100 nodes. Our results demonstrate that
the architecture achieves detection rates of up to 96.8% while maintaining network resilience
at 100%, even under active security threats.</p>
      <p>Third, we provide detailed analysis of system behavior under various attack scenarios,
examining the architecture's response to different types of security events including
intrusions, data leaks, DDoS attacks, and authentication failures. This analysis reveals
important insights into the effectiveness of distributed security mechanisms in edge
environments.</p>
      <p>The remainder of this paper is organized as follows: Section 2 reviews related work in edge
computing security and distributed trust management. Section 3 presents our system model and
theoretical framework. Section 4 details the simulation methodology and experimental setup. Section
5 describes the implementation of our security architecture. Section 6 presents comprehensive results
and analysis. Section 7 discusses implications and limitations of our findings. Finally, Section 8
concludes with future research directions.</p>
      <p>Through this work, we aim to advance the understanding of security architecture design for edge
computing environments while providing practical insights for implementing robust security
228
mechanisms in distributed systems. The findings presented here have important implications for the
development of secure edge computing applications across various domains.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>Recent advances in edge computing security have focused on addressing the fundamental challenges
of distributed trust management and privacy preservation in resource-constrained environments.
This section examines key developments across several critical areas of edge security research.</p>
      <sec id="sec-2-1">
        <title>2.1. Edge Security Architecture</title>
        <p>
          Traditional security architectures have proven inadequate for edge computing environments due to
their centralized nature and resource requirements. Zhang et al. (2022) [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] addressed this challenge
by proposing a decentralized ciphertext-policy attribute-based encryption scheme, demonstrating
improved efficiency through Type-3 pairing and mutual verification capabilities. However, their
approach primarily focuses on access control without addressing broader security requirements of
edge environments.
        </p>
        <p>
          Kenioua et al. (2024) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] developed a lightweight mutual authentication technique specifically
designed for edge computing, achieving authentication in two rounds with communication costs of
982 bits and computation time of 5.955 ms. While efficient, this approach does not address the
dynamic trust relationships characteristic of edge environments.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Privacy Preservation Mechanisms</title>
        <p>
          Privacy preservation in edge computing has emerged as a critical research focus. Huso et al. (2023)
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] introduced a decentralized service architecture combining attribute-based searchable encryption
with edge computing capabilities. Their solution demonstrated reduced latency and energy
consumption compared to cloud-based alternatives, though questions remain about scalability in
large deployments.
        </p>
        <p>The challenge of secure data consolidation has been addressed by Shruti et al. (2024) [11], who
proposed an encryption-based fog computing model for smart grid applications. Their work showed
improved performance in storage efficiency and communication costs compared to existing
approaches, but primarily focused on static network configurations.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Trust Management and Authentication</title>
        <p>Recent work in trust management has explored various approaches to establishing and maintaining
trust in distributed environments. Chen et al. (2023) [12] developed an adaptively secure
attributebased multi-authority broadcast encryption scheme, addressing limitations in single-authority
approaches through threshold secret sharing and decryption delegation. Their work demonstrated
practical improvements in user-side decryption speed and storage overhead.</p>
        <p>Cheng et al. (2024) [13] proposed an innovative approach combining blockchain with
multiauthority ciphertext-policy attribute-based encryption. Their scheme supports large-universe
attribute management and authority tracking, though computational overhead remains a concern in
resource-constrained edge environments.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Attack Resilience</title>
        <p>The vulnerability of edge systems to various cyber attacks has received significant attention. Guo et
al. (2023) [14] investigated secure consensus problems in multiagent systems under multiple
cyberattacks, proposing an observer-based dynamic cryptography-based encryption-decryption
algorithm. Their work demonstrated effective defense against replay and denial-of-service attacks,
though primarily in controlled network conditions.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Research Gaps</title>
        <p>Despite these advances, several critical gaps remain in edge computing security research. First,
existing approaches typically address specific security aspects in isolation, lacking comprehensive
architectural solutions that integrate trust management, privacy preservation, and attack resilience.
Second, current solutions often make strong assumptions about network stability and resource
availability that may not hold in practical edge deployments.</p>
        <p>Furthermore, while recent work has demonstrated promising results in specific scenarios,
questions remain about scalability and performance in large-scale, dynamic edge environments. The
integration of multiple security mechanisms while maintaining acceptable performance on
resourceconstrained devices remains a significant challenge.</p>
        <p>Our work addresses these gaps by proposing a comprehensive security architecture that combines
adaptive trust management with efficient security mechanisms, validated through extensive
experimental evaluation across various network scales and operational conditions.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. System Model</title>
      <p>We introduce a comprehensive system model that forms the foundation for our security architecture
evaluation. This model captures the essential characteristics of edge computing environments while
incorporating security and trust mechanisms necessary for robust analysis.</p>
      <sec id="sec-3-1">
        <title>3.1. Network Architecture</title>
        <p>The edge computing network is modeled as an undirected graph G(V , E) , where V represents
the set of edge nodes and E represents the communication links between nodes. Each edge node
vi V is characterized by a tuple:</p>
        <p>vi = (Ci , M i , Si ,Ti , Li ) ,</p>
        <sec id="sec-3-1-1">
          <title>Ci represents computational capacity (MIPS);</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>M i denotes memory resources (MB);</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>Si indicates security level [0,1];</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>Ti represents trust score [0,1];</title>
        </sec>
        <sec id="sec-3-1-5">
          <title>Li defines spatial coordinates in normalized space.</title>
          <p>The network topology is governed by spatial proximity, where edge establishment follows:
 1,
Eij = 
 0,
if d (Li , Lj )  rmax ;
otherwise,
where d (Li , Lj ) represents the Euclidean distance between nodes i and j , and rmax denotes the
maximum connection radius, set to 30 units in our implementation.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Trust Model</title>
        <p>Trust relationships between nodes are modeled through a dynamic trust matrix T , where each
element Tij represents the trust score that node i assigns to node j . Trust evolution follows:</p>
        <p>Tij (t +1) = Tij (t)  (1−  Iij (t)) ,
where:
•  represents the trust decay factor (0.1 in our implementation);
•</p>
        <p>Iij (t) denotes the impact of security events at time t
(1)
(2)
(3)
Trust propagation through the network incorporates distance-based decay:</p>
        <p>Impact(d) = I0  e− d ,
•
•
•
•
•
•</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Security Event Model</title>
        <p>Security events are characterized by a tuple:
e = (t, n,type, sev, det) ,
where:
• t ;
• n : target node identifier;
• type : {intrusion, data_leak, ddos, auth_failure};
• sev ;
• det .
k !
Detection probability for an event e at node n is modeled as:
P(N (t) = k) =
(t)k e−t</p>
        <p>.</p>
        <p>P(det | e, n) = Sn  (1− e− sev ) ,
sev denotes event severity.
;</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Performance Metrics</title>
        <p>System performance is evaluated through several key metrics:</p>
        <p>| e  E | e.det = 1|
1. Detection Rate: DR = ;</p>
        <p>| E |
2. Average Trust: T =
3. Network Resilience: R =
1</p>
        <p> Tij ;
| V |2 i, jV
| LCC |
| V |</p>
        <p>,
where LCC represents the largest connected component in the network.</p>
        <p>Trust stability is measured through the standard deviation of trust scores:
 T =
1</p>
        <p> (Ti − T )2 .</p>
        <p>| V | iV</p>
        <p>This model provides a robust framework for analyzing security architecture performance in edge
computing environments, incorporating both spatial and temporal aspects of security dynamics. The
mathematical formulation enables systematic evaluation of security mechanisms while maintaining
realistic operational constraints typical of edge computing deployments.
(4)</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Simulation Framework</title>
      <p>To evaluate the effectiveness of our proposed security architecture, we developed a comprehensive
simulation framework that models the complex interactions within edge computing environments.
The framework implements detailed models of network topology, security event generation, and
trust evolution mechanisms, enabling thorough analysis of system behavior under various
operational conditions.</p>
      <sec id="sec-4-1">
        <title>4.1. Implementation Architecture</title>
        <p>The simulation framework implements a multi-layered architecture comprising three primary
components: network modeling, security event simulation, and trust management. Each edge node
in the network is characterized by the tuple (1). The network topology G(V , E) is constructed using
spatial distribution, where edge establishment follows (2).</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Node Characteristics</title>
        <p>Each node's characteristics are initialized following specific distributions that reflect realistic edge
computing environments:
1. Computational Resources
o Power distribution: U(1000, 5000) MIPS;
o Memory allocation: U(512, 2048) MB;
o Resource utilization model: U (ni ) =  Ci +  Mi ,</p>
        <p>factors for CPU and memory utilization.
2. Security Parameters
o Security level: U(0.7, 0.99);
o Initial trust score: 0.8;
3. Spatial Distribution
o Location assignment: U(0, 100) × U(0, 100);
o</p>
        <p>Detection capability: P(detection | event) = Si  (1− e−severity ) .
o</p>
        <p>Connection probability: P(connectionij ) = f (dij , rmax ) .</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Event Generation Mechanism</title>
        <p>Security events are generated following a Poisson process
Each event e is characterized by (4).</p>
        <p>Event impact on system trust is modeled through:
Impact(e) = sev  (1−  det) ,</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Trust Evolution Algorithm</title>
        <p>Trust evolution follows a dynamic model incorporating both direct experiences and neighbor
recommendations (3). Trust propagation through the network follows:</p>
        <p>1 N N
Tnetwork = N 2  Tij ,
i=1 j=1
with trust updates propagating to neighboring nodes according to:</p>
        <p>Tneighbor = Tcurrent  (1−   dij ) ,
-based decay factor.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Data Collection Methodology</title>
        <p>The framework implements comprehensive data collection mechanisms measuring:
1. Performance Metrics:
o Detection rate: DR ;
o Network resilience: R ;
o Trust evolution: T .
2. System State:
o Node status vectors;
o Trust matrix evolution;
o Event distribution patterns.
3. Resource Utilization:
o Computational load distribution;
o Memory utilization patterns;
o Network traffic characteristics.</p>
        <p>The collected data enables detailed analysis of:
• System behavior under various attack scenarios;
• Trust evolution patterns;
• Performance scaling characteristics;
• Resource utilization efficiency.</p>
        <p>This comprehensive simulation framework provides the foundation for thorough evaluation of
our security architecture's effectiveness across different operational scenarios and network
configurations.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experimental Setup</title>
      <p>This section describes our experimental methodology for evaluating the proposed security
architecture. We present the configuration parameters, network scenarios, and evaluation criteria
used in our simulation studies.</p>
      <sec id="sec-5-1">
        <title>5.1. Configuration Parameters</title>
        <p>Our experimental evaluation employs multiple configurations to assess system behavior across
different operational scenarios. The parameter ranges were selected to reflect realistic edge
computing deployments while enabling comprehensive evaluation of system scalability and
performance. Network sizes were chosen to represent small (20 nodes), medium (50 nodes), and large
(100 nodes) deployments, with simulation durations varying from 100 to 300 time units to capture
both transient and steady-state behavior.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Network Scenarios</title>
        <p>We evaluate three primary network scenarios representing different deployment configurations:
1. Dense Deployment:
o ;
o</p>
        <p>Average node degree: kav = 8.5;
o Connection radius: r = 30 units.</p>
        <p>Network topology follows:</p>
        <p> 1,
P(connection) = 
 0,
if  r 2  kmin ;
otherwise.
2. Sparse Deployment
o</p>
        <p>Average node degree: kav = 4.2;</p>
        <p>Minimum connectivity: kmin = 3 .</p>
        <p>Ensuring network resilience through: Rmin =
3. Dynamic Configuration
o
o
o
5.3. Attack Models
.</p>
        <p>;
| LCC |</p>
        <p> 0.95 .</p>
        <p>| V |
;</p>
        <p>;</p>
        <p>.</p>
        <p>Inter-burst interval: Tb = 50 units;</p>
        <p>Nb
Severity scaling: Sd = min(1.0,  si ) .</p>
        <p>i=1
4. Authentication Failures:</p>
        <p>o Base rate: a = 0.025 events/time unit;</p>
      </sec>
      <sec id="sec-5-3">
        <title>5.4. Performance Metrics</title>
        <p>We define comprehensive metrics for evaluation:
1. Security Effectiveness</p>
        <p>Detection Rate (DR): DR = Edetected 100% ;
Etotal
False Positive Rate (FPR): FPR =
Detection Latency: Ld = tdetection − toccurrence ;
Fp
F + Tn
p</p>
        <p>;
2. Trust Management
3. Network Resilience</p>
        <p>Average Trust Score: T =</p>
        <p>
Trust Stability: St = 1 − T ;
T
Recovery Rate: Rr =
T
t
;</p>
      </sec>
      <sec id="sec-5-4">
        <title>5.5. Statistical Validation</title>
        <p>To ensure statistical significance, we employ:
1. Replication Strategy
o Number of runs: 30 per configuration;
o Confidence interval: 95%;
o Variance analysis using ANOVA;
2. Convergence Criteria</p>
        <p>Steady state detection: |
x
x</p>
        <p>| ò ;
3. Error Analysis</p>
        <p>Standard error calculation: SE =
Margin of error: E = t /2  SE .</p>
        <p>s
n</p>
        <p>;</p>
        <p>Minimum simulation duration: Tmin = max(100,5Tconvergence ) ;</p>
        <p>This experimental setup enables comprehensive evaluation of our security architecture across
various operational conditions while ensuring statistical validity of results. The combination of
diverse network scenarios, realistic attack models, and comprehensive metrics provides a robust
framework for assessing system performance and effectiveness.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Results and Analysis</title>
      <p>Our experimental evaluation demonstrates the effectiveness of the proposed security architecture
across different network scales and operational conditions. We present comprehensive results from
simulations with varying network sizes (20, 50, and 100 nodes) and analyze the system's behavior
through multiple performance metrics.</p>
      <sec id="sec-6-1">
        <title>6.1. Performance Metrics Evolution</title>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Network State Analysis</title>
        <p>The network state visualization for the 50-node configuration reveals the spatial distribution of trust
relationships and connectivity patterns.</p>
      </sec>
      <sec id="sec-6-3">
        <title>6.3. Comparative Analysis</title>
        <p>Table 1 presents the quantitative results for core performance metrics across different network
sizes.</p>
        <p>The results demonstrate improved performance with increasing network size, particularly in
detection rate and average trust metrics. The detailed event analysis provided in Table 2 offers
insights into the system's behavior across different attack types.
Several key findings emerge from the analysis:
Detection Effectiveness
o Perfect detection (100%) for authentication failures, data leaks, and intrusions;
o Slightly lower detection rate (85.7%) for DDoS attacks, reflecting their distributed
nature;
o
2. Trust Management
o
o
o Effective trust propagation maintains system-wide security awareness.
3. Network Characteristics
o Perfect resilience (1.0) maintained across all configurations;
o Network density remains high despite increasing size;
o Robust connectivity supports effective security information dissemination.</p>
        <p>These results validate our architectural approach, demonstrating robust security performance
that scales effectively with network size while maintaining operational efficiency.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Discussion</title>
      <p>The experimental results provide strong validation of our proposed security architecture while
highlighting several important aspects of edge computing security. The observed improvement in
detection rates with increasing network size demonstrates the architecture's ability to leverage
collective security intelligence across distributed nodes. This emergent behavior, where larger
networks achieve detection rates of up to 96.8%, suggests that the distributed decision-making
mechanisms effectively utilize the expanded sensor coverage and cross-node validation capabilities
available in larger deployments.</p>
      <p>Trust management performance reveals a careful balance between security responsiveness and
stability. The gradual decline in average trust scores from initial values (0.800) to final states
(0.7910.796) indicates that the system maintains a conservative approach to trust evaluation while avoiding
dramatic fluctuations that could destabilize network operations. This controlled trust erosion proves
particularly important in edge environments where rapid trust changes could trigger cascade effects
across dependent services.</p>
      <p>The perfect network resilience observed across all configurations warrants careful consideration.
While maintaining a resilience value of 1.0 throughout the simulations demonstrates robust topology
management, it also suggests that our current implementation might be overly conservative in its
connection management. Future implementations might benefit from more dynamic topology
adjustments that balance connectivity requirements against security considerations.</p>
      <p>Event type analysis reveals varying effectiveness across different attack categories. The perfect
detection rates for authentication failures and intrusions contrast with the slightly lower
performance against DDoS attacks (85.7%), highlighting the inherent challenges in detecting
distributed attacks in edge environments. This performance differential suggests potential areas for
architectural enhancement, particularly in coordinating detection across multiple nodes during
distributed attack scenarios.</p>
      <p>Several limitations of our current study deserve acknowledgment. The simulation assumes perfect
communication channels between nodes, which may not reflect real-world network conditions.
Additionally, the attack models, while diverse, do not exhaust the full spectrum of possible security
threats in edge environments. These limitations suggest directions for future research, particularly
in evaluating the architecture under varying network conditions and expanded attack scenarios.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusion</title>
      <p>This study presents comprehensive experimental validation of a novel security architecture for edge
computing environments. Through extensive simulation across different network scales, we
demonstrate the architecture's effectiveness in maintaining robust security while scaling with
network size. The key finding that detection rates improve with network size (91.7% to 96.8%)
validates our approach to distributed security management and suggests promising applications in
large-scale edge deployments.</p>
      <p>The trust management mechanisms demonstrate particular effectiveness, maintaining stable trust
levels despite ongoing security challenges. The observed trust stability improvement in larger
networks (stability metric decreasing from 0.019 to 0.008) indicates that the architecture successfully
leverages increased node density to enhance security decision-making reliability. This characteristic
proves especially valuable in edge computing contexts where stable trust relationships directly
impact service reliability.</p>
      <p>Network resilience results, while impressive in maintaining perfect connectivity, suggest areas
for future investigation. The consistent resilience measures across different network sizes indicate
robust topology management but may also point to opportunities for more nuanced connectivity
control mechanisms that better balance security and operational requirements.</p>
      <p>Future research directions emerge naturally from this work. Investigation of the architecture's
performance under imperfect network conditions would provide valuable insights for practical
deployments. Additionally, expanding the attack model repertoire and examining the architecture's
response to novel threat patterns would further validate its adaptability. The integration of machine
learning techniques for attack detection and trust evaluation presents another promising avenue for
enhancement.</p>
      <p>The demonstrated scalability and robust security performance of our architecture provide a
strong foundation for securing edge computing environments. As edge computing continues to
evolve and expand, the principles and mechanisms validated in this study offer valuable guidance
for developing secure, scalable edge computing systems.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly to: check grammar and spelling.
After using this tool/service, the authors reviewed and edited the content as needed and are fully
responsible for the content of the publication.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.</given-names>
            <surname>Baidya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Moh</surname>
          </string-name>
          ,
          <article-title>Comprehensive survey on resource allocation for edge-computing-enabled metaverse</article-title>
          ,
          <source>Computer Science Review</source>
          <volume>54</volume>
          (
          <year>2024</year>
          )
          <article-title>100680</article-title>
          . https://doi.org/10.1016/j.cosrev.
          <year>2024</year>
          .
          <volume>100680</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ergen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Saoud</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shayea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>El-Saleh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ergen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Inan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.F.</given-names>
            <surname>Tuysuz</surname>
          </string-name>
          ,
          <article-title>Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond</article-title>
          ,
          <source>ICT Express</source>
          (
          <year>2024</year>
          ). https://doi.org/10.1016/j.icte.
          <year>2024</year>
          .
          <volume>08</volume>
          .007.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <article-title>Application of edge computing and IoT technology in supply chain finance</article-title>
          ,
          <source>Alexandria Engineering Journal</source>
          <volume>108</volume>
          (
          <year>2024</year>
          )
          <fpage>754</fpage>
          763. https://doi.org/10.1016/j.aej.
          <year>2024</year>
          .
          <volume>09</volume>
          .016.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Raza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Soofi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.U.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chatzinotas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.A.</given-names>
            <surname>Dobre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <article-title>A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges</article-title>
          ,
          <source>Computer Science Review</source>
          <volume>54</volume>
          (
          <year>2024</year>
          )
          <article-title>100668</article-title>
          . https://doi.org/10.1016/j.cosrev.
          <year>2024</year>
          .
          <volume>100668</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <article-title>Nguyen Gia, Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          <volume>226</volume>
          (
          <year>2024</year>
          )
          <article-title>103884</article-title>
          . https://doi.org/10.1016/j.jnca.
          <year>2024</year>
          .
          <volume>103884</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.T.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.O.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.R.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.H.</given-names>
            <surname>Alsabhan</surname>
          </string-name>
          , IoT Edge and
          <article-title>Fog Computing Architecture for Educational Systems in Universities</article-title>
          , in: 2022
          <source>IEEE International Conference on Current Development in Engineering and Technology (CCET)</source>
          ,
          <year>2022</year>
          : pp.
          <fpage>1</fpage>
          <lpage>6</lpage>
          . https://doi.org/10.1109/CCET56606.
          <year>2022</year>
          .
          <volume>10079946</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Chen,
          <article-title>Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing</article-title>
          ,
          <source>Computer Communications</source>
          <volume>211</volume>
          (
          <year>2023</year>
          )
          <fpage>119</fpage>
          133. https://doi.org/10.1016/j.comcom.
          <year>2023</year>
          .
          <volume>08</volume>
          .023.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <article-title>Privacy-preserving geo-tagged image search in edge cloud computing for IoT</article-title>
          ,
          <source>Journal of Information Security and Applications</source>
          <volume>84</volume>
          (
          <year>2024</year>
          )
          <article-title>103808</article-title>
          . https://doi.org/10.1016/j.jisa.
          <year>2024</year>
          .
          <volume>103808</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kenioua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lejdel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alamri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ramadan</surname>
          </string-name>
          ,
          <article-title>A password-based authentication approach for edge computing architectures</article-title>
          ,
          <source>Egyptian Informatics Journal</source>
          <volume>28</volume>
          (
          <year>2024</year>
          )
          <article-title>100543</article-title>
          . https://doi.org/10.1016/j.eij.
          <year>2024</year>
          .
          <volume>100543</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Huso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sparapano</surname>
          </string-name>
          , G. Piro, G. Boggia,
          <article-title>Privacy-preserving data dissemination scheme based on Searchable Encryption, publish subscribe model, and edge computing</article-title>
          ,
          <source>Computer Communications</source>
          <volume>203</volume>
          (
          <year>2023</year>
          )
          <fpage>262</fpage>
          275. https://doi.org/10.1016/j.comcom.
          <year>2023</year>
          .
          <volume>03</volume>
          .006.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>