IoT Security & Trust Models for Edge-Cloud Systems: A Reliability Engineering View

Authors

  • Karthikeyan Rajamani

DOI:

https://doi.org/10.22399/ijcesen.4430

Keywords:

IoT Security, Edge Computing, Reliability Engineering, Trust Models, Fault Tolerance

Abstract

The proliferation of Internet of Things systems across edge-cloud architectures has created a critical tension between security requirements and operational reliability. Traditional approaches treat these dimensions as competing priorities, implementing authentication, encryption, and trust mechanisms that often degrade system availability through increased latency, computational overhead, and additional failure points. This fragmentation becomes particularly problematic in mission-critical applications where both threat protection and continuous uptime are non-negotiable. This paper presents SecRel-IoT, an integrated framework that reconceptualizes security and reliability as coupled rather than opposing objectives in distributed IoT environments. The proposed architecture incorporates lightweight authentication protocols, hardware-based trust anchors, edge-distributed verification, and reliability-aware redundancy strategies that maintain security properties during failures. Mathematical models quantify security overhead impacts on availability metrics, enabling systematic trade-off analysis through multi-objective optimization and Pareto frontier mapping. Experimental validation across smart manufacturing, healthcare monitoring, traffic management, and energy grid scenarios demonstrates that properly designed security mechanisms can enhance rather than compromise system dependability. Results reveal that edge intelligence significantly reduces cloud dependencies for trust operations, optimal configurations vary substantially by application domain, and integrated approaches achieve superior availability-security balance compared to conventional designs. The framework provides actionable design patterns and implementation guidelines for practitioners building next-generation IoT systems where protection and reliability must coexist.

References

[1] National Institute of Standards and Technology, "NIST Cybersecurity for IoT Program" https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program

[2] Scott Rose, et al., "Zero Trust Architecture," NIST Special Publication 800-207, https://csrc.nist.gov/publications/detail/sp/800-207/final

[3] IEEE Standards Association, "IEEE 1934-2018 - IEEE Standard for Adoption of OpenFog Reference Architecture for Fog Computing," https://standards.ieee.org/standard/1934-2018.html

[4] Trusted Computing Group, "TPM 2.0 Library Specification," https://trustedcomputinggroup.org/resource/tpm-library-specification/

[5] Keyan Cao, et al., “An Overview on Edge Computing Research”, January 2020. https://www.researchgate.net/publication/341096184_An_Overview_on_Edge_Computing_Research

[6] Kishor S. Trivedi, "Probability and Statistics with Reliability, Queueing, and Computer Science Applications," Wiley, ISBN: 978-0-471-33341-8, November 2001, https://www.wiley.com/en-us/Probability+and+Statistics+with+Reliability%2C+Queueing%2C+and+Computer+Science+Applications%2C+2nd+Edition-p-9780471333418

[7] R. T. Marler and J. S. Arora, "Survey of Multi-Objective Optimization Methods for Engineering," Structural and Multidisciplinary Optimization, 23 March 2004. https://link.springer.com/article/10.1007/s00158-003-0368-6

[8] Internet Engineering Task Force, "Transport Layer Security (TLS) Protocol" RFC 8446, August 2018. https://datatracker.ietf.org/doc/html/rfc8446

[9] Emiliano Sisinni, et al., "Industrial Internet of Things: Challenges, Opportunities, and Directions," IEEE Transactions on Industrial Informatics, 02 July 2018, https://ieeexplore.ieee.org/document/8401919

[10] NIST, "Framework for Improving Critical Infrastructure Cybersecurity", April 16, 2018 https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf

[11] European Union Agency for Cybersecurity (ENISA), "Good Practices for Security of Internet of Things", NOVEMBER 2018. https://www.enisa.europa.eu/sites/default/files/publications/WP2018%20O-1-1-1%201%20Good%20practices%20for%20security%20of%20IoT.pdf

[12] National Institute of Standards and Technology, "Post-Quantum Cryptography," https://csrc.nist.gov/projects/post-quantum-cryptography

Downloads

Published

2025-12-04

How to Cite

Karthikeyan Rajamani. (2025). IoT Security & Trust Models for Edge-Cloud Systems: A Reliability Engineering View. International Journal of Computational and Experimental Science and Engineering, 11(4). https://doi.org/10.22399/ijcesen.4430

Issue

Section

Research Article