2018
DOI: 10.1109/access.2018.2884672
|View full text |Cite
|
Sign up to set email alerts
|

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 75 publications
(27 citation statements)
references
References 28 publications
0
27
0
Order By: Relevance
“…The authors in [259] proposed different RL based edge caching security mechanisms of anti-jamming mobile offloading, physical authentication, and friendly jamming. Taking the randomness and variation of wireless channels between mobile users and fog nodes, the literature [260] studied Qlearning based physical layer security in fog computing to improve the impersonation detection attack and the accuracy of receivers by learning from the dynamic environment. The work in [262] investigated a new ML based privacypreserving multifunctional data aggregation framework in order to overcome drawbacks of existing methods, which are high computation overhead, communication efficiency, and single aggregation function calculation.…”
Section: ) Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [259] proposed different RL based edge caching security mechanisms of anti-jamming mobile offloading, physical authentication, and friendly jamming. Taking the randomness and variation of wireless channels between mobile users and fog nodes, the literature [260] studied Qlearning based physical layer security in fog computing to improve the impersonation detection attack and the accuracy of receivers by learning from the dynamic environment. The work in [262] investigated a new ML based privacypreserving multifunctional data aggregation framework in order to overcome drawbacks of existing methods, which are high computation overhead, communication efficiency, and single aggregation function calculation.…”
Section: ) Security and Privacymentioning
confidence: 99%
“…-Limited storage and computation for training DL models. DL-based privacy and security [259], [260], [263] -Inaccurate and delayed state information, e.g., CSI and energy state information.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Securing IoT networks is key to enable their wide adoption. While previous works consider the protection of IoT devices [1], the focus of our proposed solution is about data protection. Data security is one of the key challenges in the big data era [2].…”
Section: Related Workmentioning
confidence: 99%
“…The scheme aims at reducing the re-encryption overhead when authority revocations occur such as the case with key leakage. Thus, in case of authority revocation, 1 4 of the data needs to be re-encrypted, which reduces the computation overhead. 7) IDA-XOR 2016 [31]: This variant is based on "error code correction".…”
Section: B Rabin Information Dispersal Algorithm Ida [20]mentioning
confidence: 99%
See 1 more Smart Citation