Hidden data attack detection method based on fog computing and layered trust evaluation mechanism

An evaluation mechanism and a technology for hiding data, applied in the field of network information security, it can solve problems such as incompatibility, multiple network resources, and increased burden on intermediate equipment, so as to avoid economic losses, reduce the consumption of network resources, and maintain network performance.

Active Publication Date: 2018-10-19
HUAQIAO UNIVERSITY
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these two architectures have different disadvantages: the establishment of the first kind of trust is local, it cannot guarantee the trustworthiness of nodes / devices from a global perspective, and it is easily affected by environmental factors
The second type of trust is established at a higher level, but it increases the burden on intermediate devices in computing, storage, communication, etc.
These two also have some common shortcomings: they are not suitable for wireless sensor networks WSNs with mobility; they cannot guarantee the security and trustworthiness of WSNs at the sensory data level (the trust evaluation mechanism based on sensory data needs to consume more network resources, which are less suitable for implementation in WSNs)
[0004] However, the cloud is far away from WSNs and has a certain delay. Obviously, it is not suitable for data-level trust evaluation in the cloud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden data attack detection method based on fog computing and layered trust evaluation mechanism
  • Hidden data attack detection method based on fog computing and layered trust evaluation mechanism
  • Hidden data attack detection method based on fog computing and layered trust evaluation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0042] A hidden data attack detection method based on fog computing and hierarchical trust evaluation mechanism of the present invention, comprising:

[0043] Establish a behavior-level trust evaluation mechanism;

[0044] Based on the behavior-level trust evaluation mechanism, data-level trust evaluation is performed to detect hidden data attacks.

[0045] Data level trust evaluation is carried out on the basis of behavior level trust evaluation. Therefore, firstly, a hierarchical trust evaluation mechanism is designed to ensure the trust of nodes at the behavioral level, and then, a hidden data attack detection scheme is implemented at the fog layer. The use of fog computing can guarantee the trust status of nodes from a more global perspective, reduce network resource consumption and increase the scalability of the trust evaluation mechanis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hidden data attack detection method based on fog computing and a layered trust evaluation mechanism, and belongs to the field of network information safety, specifically a method for guaranteeing that node behaviors in wireless sensor networks (WSNs) are credible through the layered trust evaluation mechanism based on the fog computing, guaranteeing that nodes are credibleat a data level base on the above, i.e., detecting the attack performance of hidden data. According to the invention, the method enables the computing and storage task in the trust evaluation mechanism to be transferred to a fog layer, can remarkably reduce the network resources consumed by the trust evaluation mechanism, can maintain the network performances in a better way, and is superior in the expansibility of the trust evaluation mechanism. Meanwhile, the method can be applied to the dynamic and stationary WSNs, guarantees the trust state of the sensing nods at the data level, and prevents the hidden data attach from causing the economic loss of a sensing cloud application.

Description

technical field [0001] The invention relates to the technical field of network information security, and more specifically, to a hidden data attack detection method based on fog computing and a hierarchical trust evaluation mechanism in a sensor cloud. Background technique [0002] Sensing cloud is a research hotspot now, but it still has some security problems, such as internal attack. Internal attack refers to a security threat in which malicious nodes / devices enter the sensor cloud with legitimate identities and may launch malicious attacks. Since malicious attacks can reduce network performance, reduce network life, destroy network functions, and cause network service errors, it will cause greater harm to the development of the sensor cloud and social and economic benefits. Among these internal attacks, there is a special attack method, which is the hidden data attack. Hidden data attacks refer to malicious nodes / devices that behave normally during the network life cyc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W84/18H04L29/06H04W12/121
CPCH04L63/1416H04W12/00H04W84/18
Inventor 王田张广学梁玉珠沈雪微罗浩
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products