Detection of Hidden Data Attacks Combined Fog Computing and Trust Evaluation Method in Sensor‐cloud System

Guangxue Zhang,Tian Wang,Guojun Wang,Anfeng Liu,Weijia Jia
DOI: https://doi.org/10.1002/cpe.5109
2018-01-01
Abstract:SummaryWith the popularity of Sensor‐Cloud, its security issues get more attention from industry and academia. Especially, Sensor‐Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog‐based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks.
What problem does this paper attempt to address?