2019
DOI: 10.3390/s19194235
|View full text |Cite
|
Sign up to set email alerts
|

False Data Detection for Fog and Internet of Things Networks

Abstract: The Internet of Things (IoT) context brings new security issues due to billions of smart end-devices both interconnected in wireless networks and connected to the Internet by using different technologies. In this paper, we propose an attack-detection method, named Data Intrusion Detection System (DataIDS), based on real-time data analysis. As end devices are mainly resource constrained, Fog Computing (FC) is introduced to implement the DataIDS. FC increases storage, computation capabilities, and processing cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…For instance, the authors of [ 34 ] presented a distributed Bayesian algorithm to detect faulty nodes, while the authors of [ 35 ] used a fog computing architecture to detect, filter, and correct abnormal sensed data. In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ].…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, the authors of [ 34 ] presented a distributed Bayesian algorithm to detect faulty nodes, while the authors of [ 35 ] used a fog computing architecture to detect, filter, and correct abnormal sensed data. In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ].…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
“…For instance, the authors of [ 34 ] presented a distributed Bayesian algorithm to detect faulty nodes, while the authors of [ 35 ] used a fog computing architecture to detect, filter, and correct abnormal sensed data. In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks;…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, different fog computing models have been introduced to reduce the latency and processing overheads involved in managing and accessing data resources from the cloud sources towards the edge of the end-devices (e.g., [44][45][46][47]). These fog nodes usually provide intermediary computation and networking services between the end-users and the traditional cloud data servers.…”
Section: The Backgroundmentioning
confidence: 99%
“…Paper [ 7 ], entitled “False Data Detection for Fog and Internet of Things Networks”, by Fantacci et al addresses the problem of attack detection in Fog/IoT environments. The authors propose an attack-detection method, named Data Intrusion Detection System (DataIDS), that is based on real-time analysis of physical (sensed) data.…”
Section: Contributionsmentioning
confidence: 99%