Secure and scalable edge computing framework for IoT-enabled urban mobility systems

Authors

https://doi.org/10.22105/sci.v2i4.51

Abstract

The demand for efficient urban mobility systems has increased interest in distributed Internet of Things (IoT) applications. Edge computing is a pivotal solution that processes data closer to IoT devices, optimizes real-time responses, and reduces dependency on centralized servers. This paper explores the role of edge computing in urban mobility solutions, focusing on traffic flow optimization, Vehicle-to-Vehicle (V2V) communication, and load distribution among IoT devices. Using edge nodes for decentralized processing enables faster decision-making and reduces network congestion in smart cities. We evaluate the benefits and challenges of edge computing in IoT-based mobility systems and propose frameworks to enhance system scalability and reliability. Our findings reveal that edge computing supports real-time data processing, cost-efficient operations, and scalable urban mobility solutions for future smart cities.

 

Keywords:

Edge computing, Internet of things, Urban mobility, Decentralized processing, Smart city

References

  1. [1] Raj, M. (In Peess). IoT-based urban mobility solutions for traffic congestion. Computational engineering and technology innovations. https://doi.org/10.48314/ceti.vi.44

  2. [2] Sood, S. K. (2021). Smart vehicular traffic management: An edge cloud centric IoT based framework. Internet of things, 14, 100140. https://doi.org/10.1016/j.iot.2019.100140

  3. [3] Abdullah, M. F. A., Yogarayan, S., Razak, S. F. A., Azman, A., Amin, A. H. M., & Salleh, M. (2023). Edge computing for vehicle to everything: A short review. F1000Research, 10, 1104. https://doi.org/10.12688/f1000research.73269.4

  4. [4] Bréhon--Grataloup, L., Kacimi, R., & Beylot, A.-L. (2022). Mobile edge computing for V2X architectures and applications: A survey. Computer networks, 206, 108797. https://doi.org/10.1016/j.comnet.2022.108797

  5. [5] Mao, Y., You, C., Zhang, J., Huang, K., & Letaief, K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE communications surveys & tutorials, 19(4), 2322–2358. https://doi.org/10.1109/COMST.2017.2745201

  6. [6] Yan, G., Liu, K., Liu, C., & Zhang, J. (2024). Edge intelligence for internet of vehicles: A survey. IEEE transactions on consumer electronics, 70(2), 4858–4877. https://doi.org/10.1109/TCE.2024.3378509

  7. [7] Gheorghe, C., & Soica, A. (2025). Revolutionizing urban mobility: A systematic review of AI, IoT, and predictive analytics in adaptive traffic control systems for road networks. Electronics (2079-9292), 14(4), 719. https://doi.org/10.3390/electronics14040719

  8. [8] Patra, B., Tamrakar, A., & Sharma, R. (2019). Edge computing: Evolution, challenges, and future directions. Turkish journal of computer and mathematics education vol, 10(1), 741–745. https://doi.org/10.61841/turcomat.v10i1.14603

  9. [9] Kong, L., Tan, J., Huang, J., Chen, G., Wang, S., Jin, X., … & Das, S. K. (2022). Edge-computing-driven internet of things: A survey. ACM computing surveys, 55(8), 1–41. https://doi.org/10.1145/3555308

  10. [10] Sheikh, A. M., Islam, M. R., Habaebi, M. H., Zabidi, S. A., Bin Najeeb, A. R., & Kabbani, A. (2025). A survey on edge computing (EC) security challenges: Classification, threats, and mitigation strategies. Future internet, 17(4), 175. https://doi.org/10.3390/fi17040175

  11. [11] Trigka, M., & Dritsas, E. (2025). Edge and cloud computing in smart cities. Future internet, 17(3), 118. https://doi.org/10.3390/fi17030118

  12. [12] Madamori, O., Max-Onakpoya, E., Erhardt, G. D., & Baker, C. E. (2021). Enabling opportunistic low-cost smart cities by using tactical edge node placement. 2021 16th annual conference on wireless on-demand network systems and services conference (WONS) (pp. 1–8). IEEE. https://doi.org/10.23919/WONS51326.2021.9415579

  13. [13] Zreikat, A. I., AlArnaout, Z., Abadleh, A., Elbasi, E., & Mostafa, N. (2025). The integration of the internet of things (IoT) applications into 5G networks: A review and analysis. Computers, 14(7), 250. https://doi.org/10.3390/computers14070250

  14. [14] Mahbub, M., & Shubair, R. M. (2023). Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions. Journal of network and computer applications, 219, 103726. https://doi.org/10.1016/j.jnca.2023.103726

  15. [15] Mahomed, A. S., & Saha, A. K. (2025). Unleashing the potential of 5G for smart cities: A focus on real-time digital twin integration. Smart cities, 8(2), 70. https://doi.org/10.3390/smartcities8020070

  16. [16] Ferrag, M. A., Friha, O., Kantarci, B., Tihanyi, N., Cordeiro, L., Debbah, M., … & Choo, K. K. R. (2023). Edge learning for 6G-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses. IEEE communications surveys & tutorials, 25(4), 2654–2713. https://doi.org/10.1109/COMST.2023.3317242

  17. [17] Spadaccino, P., & Cuomo, F. (2020). Intrusion detection systems for iot: Opportunities and challenges offered by edge computing and machine learning. https://arxiv.org/abs/2012.01174

  18. [18] Alotaibi, A., Aldawghan, H., & Aljughaiman, A. (2025). A review of the authentication techniques for internet of things devices in smart cities: Opportunities, challenges, and future directions. Sensors, 25(6), 1649. https://doi.org/10.3390/s25061649

  19. [19] Gușiță, B., Anton, A. A., Stângaciu, C. S., Stănescu, D., Găină, L. I., & Micea, M. V. (2025). Securing IoT edge: A survey on lightweight cryptography, anonymous routing and communication protocol enhancements. International journal of information security, 24(3), 149. https://doi.org/10.1007/s10207-025-01071-7

  20. [20] Kumar, S., Hu, Y., Andersen, M. P., Popa, R. A., & Culler, D. E. (2019). JEDI: many-to-many end-to-end encryption and key delegation for IoT. https://arxiv.org/abs/1905.13369

  21. [21] Varugu, R. B., & Kumar, G. A. (2023). A survey on iot device authentication and anomaly detection for cyber security using machine learning [presentation]. Proceedings of the 5th international conference on communication and information processing (ICCIP)-2023. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4798899

  22. [22] Tran-Truong, P. T., Pham, M. Q., Son, H. X., Nguyen, D. L., Nguyen, M. B., Tran, K. L., ... & Nguyen, A. T. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. Journal of systems architecture, 162, 103402. https://doi.org/10.1016/j.sysarc.2025.103402

  23. [23] Rahman, M. M., Al Shakil, S., & Mustakim, M. R. (2025). A survey on intrusion detection system in IoT networks. Cyber security and applications, 3, 100082. https://doi.org/10.1016/j.csa.2024.100082

  24. [24] Čižiūnienė, K., Prokopovič, M., Zaranka, J., & Matijošius, J. (2024). Biometric breakthroughs for sustainable travel: Transforming public transportation through secure identification. Sustainability, 16(12), 5071. https://doi.org/10.3390/su16125071

  25. [25] Lien, C. W., & Vhaduri, S. (2023). Challenges and opportunities of biometric user authentication in the age of iot: A survey. ACM computing surveys, 56(1), 1–37. https://doi.org/10.1145/3603705

  26. [26] Umar, H. G. A., Yasmeen, I., Aoun, M., Mazhar, T., Khan, M. A., Jaghdam, I. H., & Hamam, H. (2025). Energy-efficient deep learning-based intrusion detection system for edge computing: A novel DNN-KDQ model. Journal of cloud computing, 14(1), 32. https://doi.org/10.1186/s13677-025-00762-9

  27. [27] Singh, A. (2025). Real time intrusion detection in edge computing using machine learning techniques. Turkish journal of engineering, 9(2), 385–393. https://doi.org/10.31127/tuje.1516046

  28. [28] Tung, N. T., Nam, P. M., & Tin, P. T. (2021). Performance evaluation of a two-way relay network with energy harvesting and hardware noises. Digital communications and networks, 7(1), 45–54. https://doi.org/10.1016/j.dcan.2020.04.003

  29. [29] Fazeldehkordi, E., & Grønli, T.-M. (2022). A survey of security architectures for edge computing-based IoT. IoT, 3(3), 332–365. https://doi.org/10.3390/iot3030019

  30. [30] Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing-based designs for IoT security. Digital communications and networks, 6(2), 195–202. https://doi.org/10.1016/j.dcan.2019.08.006

  31. [31] Sasi, T., Lashkari, A. H., Lu, R., Xiong, P., & Iqbal, S. (2024). A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges. Journal of information and intelligence, 2(6), 455–513. https://doi.org/10.1016/j.jiixd.2023.12.001

Published

2025-12-25

How to Cite

Pourqasem, J., & Wang, M. (2025). Secure and scalable edge computing framework for IoT-enabled urban mobility systems. Smart City Insights, 2(4), 214-222. https://doi.org/10.22105/sci.v2i4.51

Similar Articles

11-20 of 34

You may also start an advanced similarity search for this article.