X. Deng, B. Chen, X. Chen, X. Pei, S. Wan and S. K. Goudos, "Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT," in IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2023.3245681.(中科院 1区)
发布时间:2024-03-13
点击次数:
发表刊物:IEEE Transactions on Industrial Informatics
摘要:Abstract—The Internet of Things (IoT) mainly consists of a large number of Internet-connected devices. The proliferation of untrusted third-party IoT applications has led to an increase in IoT-based malware attacks. In addition, it is infeasible for the IoT devices to support the sophisticated detection systems due to the restricted resources. Edge computing is considered to be promising. It provides solutions to the data security and privacy leakage brought by untrusted third-party IoT applications. In this article, an intelligent trusted and secure edge computing (ITEC) system is proposed for IoT malware detection. In this system, a signature-based preidentification mechanism is built for matching and identifying the malicious behaviors of untrusted third-party IoT applications. A delay strategy is then embedded into the risk detection engine in order to “buy time” for threat analysis and rate-limit the impact of suspicious third-party IoT applications in the system. We conduct extensive experiments to verify the effectiveness of the ITEC system and show that we can achieve accuracies of up to 98.52%.
备注:http://faculty.csu.edu.cn/dengxiaoheng/zh_CN/lwcg/10445/content/49300.htm
是否译文:否
附件:
9-A_Trusted_Edge_Computing_System_Based_on_Intelligent_Risk_Detection_for_Smart_IoT.pdf
上一条: X. Deng, L. Wang, et al. "A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges."?Journal of Systems Architecture?(2023): 102929. (JCR 1区)
下一条: P. Jiang, X. Deng, L. Wang, Z. Chen and S. Zhang, "Hypergraph Representation for Detecting 3D Objects from Noisy Point Clouds," in IEEE Transactions on Knowledge and Data Engineering, doi: 10.1109/TKDE.2022.3179608. (CCF A类)