International Journal of Emerging Research in Science, Engineering, and Management
Vol. 2, Issue 3, pp. 358-365, March 2026.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Fog-Based Security Framework for Intelligent Traffic Light Control Systems
R. S. Subhasreevignani
Arikatla Yamini
M. Reddy Prasad
D Tharun
Department of CSE, Siddharth Institute of Engineering & Technology, Puttur, AP, India.
Abstract: Intelligent Traffic Light Control Systems (ITLCS) are foundational components of modern smart cities, designed to alleviate urban congestion, optimize traffic throughput, and bolster overall road safety. However, the increasing connectivity of these systems exposes them to critical cybersecurity vulnerabilities, including data tampering, signal spoofing, unauthorized network access, and Distributed Denial-of-Service (DDoS) attacks. Such malicious interventions can lead to catastrophic traffic disruption, delayed emergency services, and systemic infrastructure failure, necessitating a robust and resilient security architecture. This project proposes a Fog-based security framework to address these challenges by decentralizing intelligence at the network edge. By deploying fog computing nodes in close physical proximity to intersections, the system enables real-time data processing and low-latency decision-making, ensuring continuous operation even during cloud connectivity outages. The security posture of the ITLCS is significantly enhanced through the integration of lightweight cryptographic protocols, multi-factor authentication, and specialized Intrusion Detection Systems (IDS) tailored for resource-constrained environments. By shifting security verification from a distant cloud to localized fog nodes, this framework provides a high-reliability, proactive defense mechanism that ensures the integrity and availability of critical transportation infrastructure.
Keywords: Herbal plant recognition, neural architectures, convolutional networks, lightweight models, sequence learning.
References:
- G M. K. Saroa and R. Aron, “Fog Computing and Its Role in Development of Smart Applications,” 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, VIC, Australia, 2018, pp. 1120-1127, doi: 10.1109/BDCloud.2018.00166.
- H. Atlam, R. Walters, and G. Wills, “Fog Computing and the Internet of Things: a review,” Big Data and Cognitive Computing, vol. 2, no. 2, p. 10, Apr. 2018, doi: 10.3390/bdcc2020010.
- T. Mecheva and N. Kakanakov, “Cybersecurity in intelligent transportation systems,” Computers, vol. 9, no. 4, p. 83, Oct. 2020, doi: 10.3390/computers9040083.
- I. Stojmenovic and S. Wen, “The Fog computing paradigm: Scenarios and security issues,” 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 2014, pp. 1-8, doi: 10.15439/2014F503.
- N. Tamuka, T. E. Mathonsi, T. O. Olwal, S. Maswikaneng, T. Muchenje, and T. M. Tshilongamulenzhe, “Intrusion Detection in Fog Computing: A Systematic Review of security Advances and challenges,” Computers, vol. 15, no. 3, p. 169, Mar. 2026, doi: 10.3390/computers15030169.
- X. Feng, Y. Wang, K. Cui, and L. Wang, “A lightweight dual authentication scheme for V2V communication in 6G-based vanets,” Digital Communications and Networks, vol. 11, no. 4, pp. 1225–1236, Dec. 2024, doi: 10.1016/j.dcan.2024.12.005.
- P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues,” Journal of Network and Computer Applications, vol. 98, pp. 27–42, Sep. 2017, doi: 10.1016/j.jnca.2017.09.002.
- I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy and H. Ming, “AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0305-0310, doi: 10.1109/CCWC.2019.8666450.
- P. K, N. B, S. Rajalakshmi and P. Duraisamy, “A Review on Lightweight Cryptographic algorithms in Internet of Things,” 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2023, pp. 1448-1451, doi: 10.1109/ICIRCA57980.2023.10220904.
- V. Gowri and B. Baranidharan, “Software Defined Network based Fog Architecture for Workload Balancing in Autonomous Vehicles,” 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2022, pp. 845-850, doi: 10.1109/ICAISS55157.2022.10010924.
- O. A. Alzubi, J. A. Alzubi, M. Alazab, A. Alrabea, A. Awajan, and I. Qiqieh, “Optimized Machine Learning-Based Intrusion Detection System for fog and edge computing environment,” Electronics, vol. 11, no. 19, p. 3007, Sep. 2022, doi: 10.3390/electronics11193007.
- J. Wei, X. Wang, N. Li, G. Yang, and Y. Mu, “A Privacy-Preserving FOG computing framework for vehicular crowdsensing networks,” IEEE Access, vol. 6, pp. 43776–43784, Jan. 2018, doi: 10.1109/access.2018.2861430.
