• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

雾计算和物联网网络中的虚假数据检测。

False Data Detection for Fog and Internet of Things Networks.

机构信息

Department of Information Engineering, University of Florence, 50139 Firenze, Italy.

Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133 Milano, Italy.

出版信息

Sensors (Basel). 2019 Sep 29;19(19):4235. doi: 10.3390/s19194235.

DOI:10.3390/s19194235
PMID:31569552
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6806242/
Abstract

The Internet of Things (IoT) context brings new security issues due to billions of smart end-devices both interconnected in wireless networks and connected to the Internet by using different technologies. In this paper, we propose an attack-detection method, named Data Intrusion Detection System (DataIDS), based on real-time data analysis. As end devices are mainly resource constrained, Fog Computing (FC) is introduced to implement the DataIDS. FC increases storage, computation capabilities, and processing capabilities, allowing it to detect promptly an attack with respect to security solutions on the Cloud. This paper also considers an attack tree to model threats and vulnerabilities of Fog/IoT scenarios with heterogeneous devices and suggests countermeasure costs. We verify the performance of the proposed DataIDS, implementing a testbed with several devices that measure different physical quantities and by using standard data-gathering protocols.

摘要

物联网(IoT)环境由于数十亿个智能终端设备通过无线网络相互连接,并使用不同技术连接到互联网,因此带来了新的安全问题。在本文中,我们提出了一种基于实时数据分析的攻击检测方法,名为 DataIDS。由于终端设备主要受到资源限制,因此引入雾计算(FC)来实现 DataIDS。FC 增加了存储、计算能力和处理能力,使其能够及时检测到针对云安全解决方案的攻击。本文还考虑了攻击树,以对具有异构设备的雾/物联网场景的威胁和漏洞进行建模,并提出了对策成本。我们通过使用标准的数据收集协议,在具有测量不同物理量的多个设备的测试台上验证了所提出的 DataIDS 的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/e2f1f60f77c7/sensors-19-04235-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/64d8503ba860/sensors-19-04235-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/307586e1545d/sensors-19-04235-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/ff93d1cd81bd/sensors-19-04235-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/855b0b1f372c/sensors-19-04235-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/c44111adb119/sensors-19-04235-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/bb0f18774631/sensors-19-04235-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/9779ffaa5fd8/sensors-19-04235-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/e2f1f60f77c7/sensors-19-04235-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/64d8503ba860/sensors-19-04235-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/307586e1545d/sensors-19-04235-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/ff93d1cd81bd/sensors-19-04235-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/855b0b1f372c/sensors-19-04235-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/c44111adb119/sensors-19-04235-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/bb0f18774631/sensors-19-04235-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/9779ffaa5fd8/sensors-19-04235-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7124/6806242/e2f1f60f77c7/sensors-19-04235-g008.jpg

相似文献

1
False Data Detection for Fog and Internet of Things Networks.雾计算和物联网网络中的虚假数据检测。
Sensors (Basel). 2019 Sep 29;19(19):4235. doi: 10.3390/s19194235.
2
Actuator behaviour modelling in IoT-Fog-Cloud simulation.物联网-雾计算-云计算模拟中的执行器行为建模
PeerJ Comput Sci. 2021 Jul 30;7:e651. doi: 10.7717/peerj-cs.651. eCollection 2021.
3
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.利用机器学习技术检测云计算中的恶意带宽消耗。
Comput Intell Neurosci. 2022 Sep 5;2022:4003403. doi: 10.1155/2022/4003403. eCollection 2022.
4
Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things.用于处理来自连接到医疗物联网的糖尿病设备数据的雾计算和边缘计算架构。
J Diabetes Sci Technol. 2017 Jul;11(4):647-652. doi: 10.1177/1932296817717007.
5
Hardware Security of Fog End-Devices for the Internet of Things.雾端物联网设备的硬件安全。
Sensors (Basel). 2020 Oct 9;20(20):5729. doi: 10.3390/s20205729.
6
Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection.使用集成学习和先进特征选择技术实现物联网和雾计算中的优化入侵检测。
PLoS One. 2024 Aug 1;19(8):e0304082. doi: 10.1371/journal.pone.0304082. eCollection 2024.
7
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.雾计算中针对虚假数据注入攻击的隐私保护数据聚合。
Sensors (Basel). 2018 Aug 13;18(8):2659. doi: 10.3390/s18082659.
8
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.面向云和雾网络的上下文感知访问控制机制研究综述:分类法与开放研究问题
Sensors (Basel). 2020 Apr 27;20(9):2464. doi: 10.3390/s20092464.
9
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.迈向基于深度学习驱动的物联网入侵检测
Sensors (Basel). 2019 Apr 27;19(9):1977. doi: 10.3390/s19091977.
10
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.

引用本文的文献

1
Assertive, Selective, Scalable IoT-Based Warning System.自信、有选择性、可扩展的基于物联网的预警系统。
Sensors (Basel). 2022 Jan 28;22(3):1015. doi: 10.3390/s22031015.
2
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog.物联网雾中早期攻击检测的混合轻量级系统。
Sensors (Basel). 2021 Dec 11;21(24):8289. doi: 10.3390/s21248289.
3
Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks.基于网络的电力系统抗欺骗攻击的弹性自适应事件触发负荷频率控制

本文引用的文献

1
A cognitive fault diagnosis system for distributed sensor networks.分布式传感器网络的认知故障诊断系统。
IEEE Trans Neural Netw Learn Syst. 2013 Aug;24(8):1213-26. doi: 10.1109/TNNLS.2013.2253491.
Sensors (Basel). 2021 Oct 24;21(21):7047. doi: 10.3390/s21217047.
4
A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica.一种用于长回程NVIS挑战性网络的基于异构层的可信度模型以及一种针对南极洲的物联网遥测服务。
Sensors (Basel). 2021 May 15;21(10):3446. doi: 10.3390/s21103446.
5
Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things.传感器网络和物联网的安全性、隐私性和可信度。
Sensors (Basel). 2020 Jul 10;20(14):3846. doi: 10.3390/s20143846.
6
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.面向云和雾网络的上下文感知访问控制机制研究综述:分类法与开放研究问题
Sensors (Basel). 2020 Apr 27;20(9):2464. doi: 10.3390/s20092464.