2018
DOI: 10.1109/jiot.2018.2795549
|View full text |Cite
|
Sign up to set email alerts
|

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 110 publications
(40 citation statements)
references
References 57 publications
0
36
0
Order By: Relevance
“…Future research could draw more attention to further automate current processes in waste management, smart lightening and pest controlling subverticals by reducing existing drawbacks since it has received the least research attention in the considered period. Fog computing, as an innovation with cross over any barrier between remote data centres and IoT devices, should be considered in future IoT analysis [63], [64], [65], [66], [67]. While IoT has solved many issues related to agriculture and farming there are limitations that we need to consider.…”
Section: Discussionmentioning
confidence: 99%
“…Future research could draw more attention to further automate current processes in waste management, smart lightening and pest controlling subverticals by reducing existing drawbacks since it has received the least research attention in the considered period. Fog computing, as an innovation with cross over any barrier between remote data centres and IoT devices, should be considered in future IoT analysis [63], [64], [65], [66], [67]. While IoT has solved many issues related to agriculture and farming there are limitations that we need to consider.…”
Section: Discussionmentioning
confidence: 99%
“…This made it possible to design safety awareness incentives. Shen et al [20] addressed an intrusion detection system (IDS) based on cloud and fog computing to detect malware in IoT. For reducing the privacy of smart devices, they computed Perfect Bayesian Equilibrium of the game in theory and then they provided strategies for improving the probability that malware will be detected.…”
Section: Related Workmentioning
confidence: 99%
“…The third and fourth stages involve the IoT network, including the attack paths, which are visualized (i.e., security visualization) and analyzed (i.e., security analysis), respectively. In [25], the authors proposed a method to detect and restrain malware diffusion in an IoT network. The solution is based on fog computing, which can simultaneously maximize malware detection and minimize the possibility of privacy breach.…”
Section: Work In Iot Securitymentioning
confidence: 99%
“…The solution is based on fog computing, which can simultaneously maximize malware detection and minimize the possibility of privacy breach. The proposed malware detection system was constructed using an IDS, and the deployment was accomplished with cloud and fog computing to avoid the restrictions on IDS deployment in smart objects [25]. Furthermore, a framework was proposed to show the possible application of malware diffusion restriction in IoT networks.…”
Section: Work In Iot Securitymentioning
confidence: 99%