Residential College | false |
Status | 已發表Published |
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system | |
Guangxue Zhang1; Tian Wang1,4; Guojun Wang2; Anfeng Liu3; Weijia Jia4 | |
2021-04-10 | |
Source Publication | Concurrency and Computation: Practice and Experience |
ISSN | 1532-0626 |
Volume | 33Issue:7 |
Other Abstract | With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks. |
Keyword | Fog Computing Hidden Data Attacks Internal Attacks Sensor-cloud Trust Evaluation Mechanism |
DOI | 10.1002/cpe.5109 |
URL | View the original |
Indexed By | SCIE |
Language | 英語English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Software Engineering ; Computer Science, Theory & Methods |
WOS ID | WOS:000632049700013 |
Publisher | WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ |
Scopus ID | 2-s2.0-85059053588 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | THE STATE KEY LABORATORY OF INTERNET OF THINGS FOR SMART CITY (UNIVERSITY OF MACAU) Faculty of Science and Technology |
Corresponding Author | Tian Wang |
Affiliation | 1.College of Computer Science and Technology, Huaqiao University, China 2.School of Computer Science and Educational Software, Guangzhou University, China 3.School of Information Science and Engineering, Central South University, China 4.State Key Laboratory of Internet of Things for Smart City, University of Macau, Macao |
Corresponding Author Affilication | University of Macau |
Recommended Citation GB/T 7714 | Guangxue Zhang,Tian Wang,Guojun Wang,et al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7). |
APA | Guangxue Zhang., Tian Wang., Guojun Wang., Anfeng Liu., & Weijia Jia (2021). Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, 33(7). |
MLA | Guangxue Zhang,et al."Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system".Concurrency and Computation: Practice and Experience 33.7(2021). |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment