Residential Collegefalse
Status已發表Published
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
Guangxue Zhang1; Tian Wang1,4; Guojun Wang2; Anfeng Liu3; Weijia Jia4
2021-04-10
Source PublicationConcurrency and Computation: Practice and Experience
ISSN1532-0626
Volume33Issue:7
Other Abstract

With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks.

KeywordFog Computing Hidden Data Attacks Internal Attacks Sensor-cloud Trust Evaluation Mechanism
DOI10.1002/cpe.5109
URLView the original
Indexed BySCIE
Language英語English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Software Engineering ; Computer Science, Theory & Methods
WOS IDWOS:000632049700013
PublisherWILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ
Scopus ID2-s2.0-85059053588
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionTHE STATE KEY LABORATORY OF INTERNET OF THINGS FOR SMART CITY (UNIVERSITY OF MACAU)
Faculty of Science and Technology
Corresponding AuthorTian Wang
Affiliation1.College of Computer Science and Technology, Huaqiao University, China
2.School of Computer Science and Educational Software, Guangzhou University, China
3.School of Information Science and Engineering, Central South University, China
4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macao
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Guangxue Zhang,Tian Wang,Guojun Wang,et al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
APA Guangxue Zhang., Tian Wang., Guojun Wang., Anfeng Liu., & Weijia Jia (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7).
MLA Guangxue Zhang,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system".Concurrency and Computation: Practice and Experience 33.7(2021).
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Guangxue Zhang]'s Articles
[Tian Wang]'s Articles
[Guojun Wang]'s Articles
Baidu academic
Similar articles in Baidu academic
[Guangxue Zhang]'s Articles
[Tian Wang]'s Articles
[Guojun Wang]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Guangxue Zhang]'s Articles
[Tian Wang]'s Articles
[Guojun Wang]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.