科研成果详情

发表状态已发表Published
题名Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
作者
发表日期2021
发表期刊Concurrency and Computation: Practice and Experience
ISSN/eISSN11532-0626;1532-0634
卷号33期号:7
摘要

With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks. © 2018 John Wiley & Sons, Ltd.

关键词fog computing hidden data attacks internal attacks sensor-cloud trust evaluation mechanism
DOI10.1002/cpe.5109
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Computer Science
WOS类目Computer Science, Software Engineering ; Computer Science, Theory & Methods
WOS记录号WOS:000632049700013
出版者John Wiley and Sons Ltd
引用统计
被引频次:69[WOS]   [WOS记录]     [WOS相关记录]
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/4464
专题个人在本单位外知识产出
作者单位
1.College of Computer Science and Technology, Huaqiao UniversityXiamen, China
2.School of Computer Science and Educational Software, Guangzhou UniversityGuangzhou, China
3.School of Information Science and Engineering, Central South UniversityHunan, China
4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macau, China
推荐引用方式
GB/T 7714
Zhang, Guangxue,Wang, Tian,Wang, Guojunet al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
APA Zhang, Guangxue, Wang, Tian, Wang, Guojun, Liu, Anfeng, & Jia, Weijia. (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7).
MLA Zhang, Guangxue,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system". Concurrency and Computation: Practice and Experience 33.7(2021).
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Zhang, Guangxue]的文章
[Wang, Tian]的文章
[Wang, Guojun]的文章
百度学术
百度学术中相似的文章
[Zhang, Guangxue]的文章
[Wang, Tian]的文章
[Wang, Guojun]的文章
必应学术
必应学术中相似的文章
[Zhang, Guangxue]的文章
[Wang, Tian]的文章
[Wang, Guojun]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。