Concurrency and Computation: Practice and Experience | 2021

Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system

 
 
 
 
 

Abstract


With the popularity of Sensor‐Cloud, its security issues get more attention from industry and academia. Especially, Sensor‐Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog‐based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks.

Volume 33
Pages None
DOI 10.1002/cpe.5109
Language English
Journal Concurrency and Computation: Practice and Experience

Full Text