Open Access iconOpen Access

ARTICLE

Trust-Centric Security Architecture and Anomaly Analytics for Distributed Fog-IoT Systems

Maram Fahaad Almufareh1,*, Mamoona Humayun2, Sadia Din3,*, Khalid Haseeb4, Amr Munshi5

1 Department of Information System, College of Computer and Information Sciences, Sakaka, Al-Jouf, Saudi Arabia
2 School of Computing, Engineering and the Built Environment, University of Roehampton, London, UK
3 School of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea
4 Department of Computer Science, Islamia College Peshawar, Pakistan
5 Department of Computer and Network Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia

* Corresponding Authors: Maram Fahaad Almufareh. Email: email; Sadia Din. Email: email

(This article belongs to the Special Issue: Emerging Technologies in Information Security: Modeling, Algorithms, and Applications)

Computer Modeling in Engineering & Sciences 2026, 147(1), 49 https://doi.org/10.32604/cmes.2026.080287

Abstract

The real-time systems perform key functionalities in various fields to automate the communication and response in critical events. The Internet of Things (IoT), integrated with numerous physical objects, gathers environmental data, processes it at the edge, and provides intelligent decisions while routing health records to processing units. However, the dynamic and resource-constrained nature of IoT-based healthcare environments introduces significant challenges related to latency, transmission costs, and the reliable interaction of devices amid uncertain activities. In this work, we propose a framework for a consistent and trustworthy system that uses a weighted trust aggregation model to consider multiple parameters and support timely routing decisions in a Fog-driven healthcare environment. Furthermore, authorized access to critical and sensitive health data is achieved through mutual authentication among devices, ensuring data integrity. The analysis of trust scores dynamically enhances resilience and the timely detection of malicious actions, thereby improving the healthcare system’s performance across unpredictable channels. The performance of the proposed framework is tested and validated against CLCSR and FSRF, and performance results revealed the significance for energy consumption, response time, network throughput, trust level, and accuracy across varying fog node capacity and interference scenarios.

Keywords

Fog computing; data privacy; healthcare system; intelligent decision; network attackers

Cite This Article

APA Style
Almufareh, M.F., Humayun, M., Din, S., Haseeb, K., Munshi, A. (2026). Trust-Centric Security Architecture and Anomaly Analytics for Distributed Fog-IoT Systems. Computer Modeling in Engineering & Sciences, 147(1), 49. https://doi.org/10.32604/cmes.2026.080287
Vancouver Style
Almufareh MF, Humayun M, Din S, Haseeb K, Munshi A. Trust-Centric Security Architecture and Anomaly Analytics for Distributed Fog-IoT Systems. Comput Model Eng Sci. 2026;147(1):49. https://doi.org/10.32604/cmes.2026.080287
IEEE Style
M. F. Almufareh, M. Humayun, S. Din, K. Haseeb, and A. Munshi, “Trust-Centric Security Architecture and Anomaly Analytics for Distributed Fog-IoT Systems,” Comput. Model. Eng. Sci., vol. 147, no. 1, pp. 49, 2026. https://doi.org/10.32604/cmes.2026.080287



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 37

    View

  • 14

    Download

  • 0

    Like

Share Link