发表状态 | 已发表Published |
题名 | Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system |
作者 | |
发表日期 | 2021 |
发表期刊 | Concurrency and Computation: Practice and Experience
![]() |
ISSN/eISSN | 11532-0626;1532-0634 |
卷号 | 33期号:7 |
摘要 | With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks. © 2018 John Wiley & Sons, Ltd. |
关键词 | fog computing hidden data attacks internal attacks sensor-cloud trust evaluation mechanism |
DOI | 10.1002/cpe.5109 |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Software Engineering ; Computer Science, Theory & Methods |
WOS记录号 | WOS:000632049700013 |
出版者 | John Wiley and Sons Ltd |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/4464 |
专题 | 个人在本单位外知识产出 |
作者单位 | 1.College of Computer Science and Technology, Huaqiao UniversityXiamen, China 2.School of Computer Science and Educational Software, Guangzhou UniversityGuangzhou, China 3.School of Information Science and Engineering, Central South UniversityHunan, China 4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macau, China |
推荐引用方式 GB/T 7714 | Zhang, Guangxue,Wang, Tian,Wang, Guojunet al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7). |
APA | Zhang, Guangxue, Wang, Tian, Wang, Guojun, Liu, Anfeng, & Jia, Weijia. (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7). |
MLA | Zhang, Guangxue,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system". Concurrency and Computation: Practice and Experience 33.7(2021). |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论