Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system

被引:69
作者
Zhang, Guangxue [1 ]
Wang, Tian [1 ,4 ,5 ]
Wang, Guojun [2 ]
Liu, Anfeng [3 ]
Jia, Weijia [4 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Peoples R China
[3] Cent South Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
[4] Univ Macau, State Key Lab Internet Things Smart City, Macau, Peoples R China
[5] 668 Jimei Ave, Xiamen, Peoples R China
关键词
fog computing; hidden data attacks; internal attacks; sensor‐ cloud; trust evaluation mechanism; PROTOCOL; MANAGEMENT; NETWORKS; INTERNET; SERVICE; SECURE;
D O I
10.1002/cpe.5109
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks.
引用
收藏
页数:13
相关论文
共 42 条
[1]   A Survey on Sensor-Cloud: Architecture, Applications, and Approaches [J].
Alamri, Atif ;
Ansari, Wasai Shadab ;
Hassan, Mohammad Mehedi ;
Hossain, M. Shamim ;
Alelaiwi, Abdulhameed ;
Hossain, M. Anwar .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[2]  
Bao F., 2012, INT WORKSH SELF AW I, P1
[3]   Dependable Structural Health Monitoring Using Wireless Sensor Networks [J].
Bhuiyan, Md Zakirul Alam ;
Wang, Guojun ;
Wu, Jie ;
Cao, Jiannong ;
Liu, Xuefeng ;
Wang, Tian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) :363-376
[4]   Cloud-Assisted Data Fusion and Sensor Selection for Internet of Things [J].
Bijarbooneh, Farshid Hassani ;
Du, Wei ;
Ngai, Edith C. -H. ;
Fu, Xiaoming ;
Liu, Jiangchuan .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (03) :257-268
[5]  
Bonomi F., 2011, 17 ANN INT C MOB COM
[6]  
Bonomi F, 2014, BIG DATA INTERNET TH, V546, P169, DOI [10.1007/978-3-319-05029-47, DOI 10.1007/978-3-319-05029-47]
[7]   BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks [J].
Fang, Weidong ;
Zhang, Chuanlei ;
Shi, Zhidong ;
Zhao, Qing ;
Shan, Lianhai .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :88-94
[8]   Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks [J].
Gilbert, Edwin Prem Kumar ;
Kaliaperumal, Baskaran ;
Rajsingh, Elijah Blessing ;
Lydia, M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 :894-909
[9]   Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
AD HOC NETWORKS, 2015, 24 :264-287
[10]   A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems [J].
Huang, Mingfeng ;
Liu, Anfeng ;
Xiong, Neal N. ;
Wang, Tian ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (02) :317-332