2018
DOI: 10.3390/computers7040063
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge Computing

Abstract: Wireless sensor network is an emerging technology, and the collaboration of wireless sensors becomes one of the active research areas for utilizing sensor data. Various sensors collaborate to recognize the changes of a target environment, to identify, if any radical change occurs. For the accuracy improvement, the calibration of sensors has been discussed, and sensor data analytics are becoming popular in research and development. However, they are not satisfactorily efficient for the situations where sensor d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…An enhanced trust model based on the radial base artificial neural network (RBANN) was presented by Yasin et al [ 14 ] to predict each node’s future behavior and detect malicious nodes. Yoon et al [ 15 ] provided a DL-based approach to verify the trustworthiness of sensors by considering the sensor data only. These studies focus on applying ML and DL to identify the attack or faulty sensor node and give little consideration to improving the security of communication, not to mention enhancing the security from the physical level.…”
Section: Related Workmentioning
confidence: 99%
“…An enhanced trust model based on the radial base artificial neural network (RBANN) was presented by Yasin et al [ 14 ] to predict each node’s future behavior and detect malicious nodes. Yoon et al [ 15 ] provided a DL-based approach to verify the trustworthiness of sensors by considering the sensor data only. These studies focus on applying ML and DL to identify the attack or faulty sensor node and give little consideration to improving the security of communication, not to mention enhancing the security from the physical level.…”
Section: Related Workmentioning
confidence: 99%
“…The attacker impersonates the physical devices of the legitimate users to propagate malicious effect, steal data, or interfere with edge network access control. In an attempt to solve a spoofing attack, Yoon in [108] ensures that each participating sensor device transmits their data to a legitimate edge node in the Java-Script Object Notation (JSON) format. The wireless sensor networks (WSNs) are requested to send the JSON data about their neighboring sensors.…”
Section: ) Spoofing Attackmentioning
confidence: 99%
“…The adversary utilizes the advantage of the weaknesses that exist in the physical resources of an edge network before they are discovered by the party responsible for the mitigation exercise. In [108], the authors used an artificial neural network to solve the zero-day attack problems. The tolerance and trigger areas constructed at a training stage are dedicated to ensuring the trustworthiness of the sensors.…”
Section: ) Zero-day Attackmentioning
confidence: 99%