Fog Node Trust Evaluation Technology Combined with a Consensus Mechanism and its Application

Authors

  • Guanglei Sheng School of Computer and Artificial Intelligence, Henan Finance University, Zhengzhou, Henan 451464, China
  • Qingtao Wu School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, Henan 450046, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1413

Keywords:

Consensus mechanism, fog nodes, trust, blockchain

Abstract

To address the issue of node trustworthiness in fog computing networks, this study proposes a fog node trust evaluation technique that integrates consensus mechanisms. This paper adopts the innovative proof of interest algorithm (PoIA) consensus mechanism to achieve lightweight verification. The core methods include formulaic reputation evaluation algorithms to quantify node behavior and economic incentives, as well as deposit mechanisms to increase attack costs. Experimental studies have shown that this technology can still maintain 93.2% availability even under high malicious node rates. After applying this technology, the throughput of the fog computing network is 985TPS, the latency is reduced to 125 ms, and the energy consumption is reduced by 26.8%. The experiment confirmed that this technology significantly improves the accuracy of malicious behavior detection and resource allocation efficiency through the collaborative innovation of dynamic reputation evaluation and PoIA lightweight consensus, providing a reliable solution for large-scale fog computing deployment.

Downloads

Download data is not yet available.

Author Biographies

Guanglei Sheng, School of Computer and Artificial Intelligence, Henan Finance University, Zhengzhou, Henan 451464, China

Guanglei Sheng was born in Henan, China, in 1982. From 2000 to 2004, he studied at Zhengzhou University and received his bachelor’s degree in 2004. From 2004 to 2007, he studied at Zhengzhou University and received his master’s degree in 2007. Currently, he works at Henan Finance University. He has published 17 papers, two of which have been indexed by EI. His research interests include machine learning and embedded systems.

Qingtao Wu, School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, Henan 450046, China

Qingtao Wu was born in Henan, China, in 1981. From 2000 to 2004, he studied at Zhengzhou University and received his bachelor’s degree in 2004. From 2005 to 2008, He studied at Chongqing University and received his master’s degree in 2008. He has published 5 papers. His research interests include image processing and big data.

References

Rehman, A., Awan, K. A., Ud Din, I., Almogren, A., and Alabdulkareem, M. (2023). FogTrust: Fog-integrated multi-leveled trust management mechanism for internet of things. Technologies, 11(1), 27–36.

Ghaleb, M., and Azzedin, F. (2023). Trust-aware fog-based iot environments: Artificial reasoning approach. Applied Sciences, 13(6), 3665–3677.

Alwakeel, A. M., and Alnaim, A. K. (2024). Trust management and resource optimization in edge and fog computing using the cyberguard framework. Sensors, 24(13), 4308–4320.

Ramamurthy, P., and Nandagopal, M. (2023). Enabling trust and security between fog nodes using blockchain technology. Journal of Intelligent & Fuzzy Systems, 44(3), 4605–4612.

Hameed, F. M. H., and Kurnaz, S. (2024). An effective mechanism for FOG computing assisted function based on trustworthy forwarding scheme (IOT). Electronics, 13(14), 2715–2727.

Kaur, A., and Auluck, N. (2023). Real-time trust aware scheduling in fog-cloud systems. Concurrency and Computation: Practice and Experience, 35(10), e7680–e7693.

Alwakeel, A. M. (2023). Performance analysis of a keyword-based trust management system for fog computing. Applied Sciences, 13(15), 8714–8728.

Bakhtiari, N. B., Rafighi, M., and Ahsan, R. (2024). A trust management system for fog computing using improved genetic algorithm. The Journal of Supercomputing, 80(14), 20923–20955.

Faraji, F., Javadpour, A., Sangaiah, A. K., and Zavieh, H. (2024). A solution for resource allocation through complex systems in fog computing for the internet of things. Computing, 106(7), 2107–2131.

Jain, V., and Kumar, B. (2023). A trusted resource allocation scheme in fog environment to satisfy high network demand. Arabian Journal for Science and Engineering, 48(8), 9769–9786.

Ali, N. A. M., and Ali, F. A. M. (2023). Optimizing cloud-fog-edge job scheduling using catastrophic genetic algorithm and block chain-based trust: a collaborative approach. J Appl Eng Technol Sci, 5(1), 569–580.

Alnaim, A. K., and Alwakeel, A. M. (2025). Zero-Trust mechanisms for securing distributed edge and fog computing in 6G networks. Mathematics, 13(8), 32–45.

Fotia, L., Delicato, F., and Fortino, G. (2023). Trust in edge-based internet of things architectures: state of the art and research challenges. ACM Computing Surveys, 55(9), 1–34.

Reshi, I. A., and Sholla, S. (2024). Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action. Peer-to-Peer Networking and Applications, 17(6), 3905–3933.

Alvi, A. N., Ali, B., Saleh, M. S., Alkhathami, M., Alsadie, D., and Alghamdi, B. (2024). Secure computing for fog-enabled industrial IoT. Sensors, 24(7), 2098–2111.

Choppara, P., and Mangalampalli, S. S. (2024). Reliability and trust aware task scheduler for cloud-fog computing using advantage actor critic (A2C) algorithm. IEEE Access, 12, 102126–102145.

Reshi, I. A., and Sholla, S. (2025). IBF network: enhancing network privacy with IoT, blockchain, and fog computing on different consensus mechanisms. Cluster Computing, 28(3), 208–222.

Burhan, M., Alam, H., Arsalan, A., Rehman, R. A., Anwar, M., Faheem, M., and Ashraf, M. W. (2023). A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions. IEEE Access, 11, 73303–73329.

Liu, Y., Wang, J., Yan, Z., and Wan, Z. (2023). A survey on blockchain-based trust management for Internet of Things. IEEE Internet of Things Journal, 10(7), 5898–5922.

Wardana, A. A., Kolaczek, G., and Sukarno, P. (2024). Lightweight, trust-managing, and privacy-preserving collaborative intrusion detection for internet of things. Applied Sciences, 14(10), 4109–4121.

Agrawal, R., Singhal, S., and Sharma, A. (2024). Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Computing, 27(6), 8015–8030.

Murad, S. A., and Rahimi, N. (2024). Secure and efficient hierarchical P2P fog architecture: a novel approach for IoT. IEEE Internet of Things Journal, 11(10), 18796–18807.

Downloads

Published

2026-03-15

How to Cite

Sheng, G. ., & Wu, . Q. . (2026). Fog Node Trust Evaluation Technology Combined with a Consensus Mechanism and its Application. Journal of ICT Standardization, 14(01), 69–100. https://doi.org/10.13052/jicts2245-800X.1413

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications