2021
DOI: 10.32604/cmc.2021.016938
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

Abstract: Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomalybased Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 51 publications
0
4
0
Order By: Relevance
“…Virtual technologies like fog computing and edge computing are prone to security and privacy challenges (Aliyu et al, 2021). Hathaliya et al (2019) proposed a Permissioned blockchain-based healthcare architecture to overcome these challenges.…”
Section: Blockchain Monitoringmentioning
confidence: 99%
“…Virtual technologies like fog computing and edge computing are prone to security and privacy challenges (Aliyu et al, 2021). Hathaliya et al (2019) proposed a Permissioned blockchain-based healthcare architecture to overcome these challenges.…”
Section: Blockchain Monitoringmentioning
confidence: 99%
“…An attacker controls the communication messages; he or she intercepts the messages communicated between the user and the server. 87,88 Then the attacker interjects other information or steals the secure information from that message. Conti et al 89 in their study about man-in-the-middle attacks discussed that this type of attack is vulnerable and compromises integrity, availability, and confidentiality.…”
Section: Manipulation Related Attacksmentioning
confidence: 99%
“…This type of attack is mainly initiated for hacking public keys between sender and receiver. An attacker controls the communication messages; he or she intercepts the messages communicated between the user and the server 87,88 . Then the attacker interjects other information or steals the secure information from that message.…”
Section: Privacy and Security Threats In Osnsmentioning
confidence: 99%
“…However, it can create several challenges as well for ensuring delay-less requirements. The author of [44] proposes an Intrusion Detection and Prevention (IDPS) mechanism to deal with the man-in-the-middle attacks in the fog network. This mechanism consists of IDS nodes that detect any anomaly happening in the network by monitoring it after regular time intervals.…”
mentioning
confidence: 99%