Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing

Jie Chen,Ai-dong Xu,Hong Wen,Wen-jie Liu,Yi-xin Jiang,Peng Li,Yu-shan Li
DOI: https://doi.org/10.12783/dteees/icepe2019/28962
2019-01-01
DEStech Transactions on Environment Energy and Earth Science
Abstract:The edge computing performs data processing at the proximity of data collecting nodes, which makes the edge computing devices also face a series of malicious attacking, such as clone node attack, Sybil node attack and so on. However, such malicious attacks are hard to identify by the traditional security measures because the illegal nodes capture the keys of the legal nodes. In order to solve the above problems, a channel information approached malicious node recognition method based on intelligent algorithm for the edge computing is proposed. The novel algorithm is feasible and the recognition accuracy meets the requirements.
What problem does this paper attempt to address?