2019
DOI: 10.1109/access.2019.2942335
|View full text |Cite
|
Sign up to set email alerts
|

An Graph-Based Adaptive Method for Fast Detection of Transformed Data Leakage in IOT Via WSN

Abstract: As statistics show that most threats to information security in Internet of Things (IOT) are caused by data leakage, lots of methods have been developed to address the problem of data leakage prevention (DLP). However, most of these methods do not work well when the confidentiality of data changes frequently. We propose an Adaptive Feature Graph Update model (AFGU) to solve the problem by mapping the features of confidential data to the feature graph. First, the feature graph are built to record the features o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 35 publications
0
5
0
1
Order By: Relevance
“…From the experimental setup, the performance of the proposed MACS is assessed using the metrics aggregation loss, time delay, false rate, throughput, and verification time. For a comparative analysis, the existing methods, such as CSDA, 24 LSDAR, 18 and AFGU, 16 are considered.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…From the experimental setup, the performance of the proposed MACS is assessed using the metrics aggregation loss, time delay, false rate, throughput, and verification time. For a comparative analysis, the existing methods, such as CSDA, 24 LSDAR, 18 and AFGU, 16 are considered.…”
Section: Discussionmentioning
confidence: 99%
“…It is processed based on the encoding and decoding method, which addresses eavesdropping. Yu et al 16 have proposed an Adaptive Feature Graph Update model (AFGU), which addresses data leakage prevention (DLP). Here, the initial step is based on processing the confidential data, and then, the update of features is acquired.…”
Section: Related Workmentioning
confidence: 99%
“…The energy is uniformly distributed between the CH and the members by the thresholds, thus the CH based thresholds are implemented by the Stable Election Protocol (SEP) [9]. The major issues in IoT is the leakage of data, which is overcome with the assistance of the Adaptive Feature Graph Update model (AFGU) [10]. In IoT, the sensor node is battery dependent and to increase the life of the battery, the Real-time Data Collection Model (RDCM) [11] is utilized.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, deep learning methods, such as Deep Belief Network (DBN), Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM), have been used by many scholars to realize regression prediction ( Sezer, Berat & Ahmet, 2020 ; Shafiq et al, 2020b ; Tian et al, 2020 ; Yu et al, 2019b ; Yu et al, 2019a ). LSTM is a special recurrent neural network that transmits information of network state through gating mechanism to realize network memory function, which can alleviate not only the problem of long-range dependencies, but also the gradient disappearance and gradient explosion ( Hou et al, 2021 ).…”
Section: Introductionmentioning
confidence: 99%