[go: up one dir, main page]

Iftikhar et al., 2023 - Google Patents

Security provision by using detection and prevention methods to ensure trust in edge-based smart city networks

Iftikhar et al., 2023

View PDF
Document ID
14278611314820329741
Author
Iftikhar A
Qureshi K
Altalbe A
Javeed K
Publication year
Publication venue
IEEE Access

External Links

Snippet

The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks. Edge Computing (EC) has gained attention due to its distributive nature that brings computing resources …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Ercan et al. Misbehavior detection for position falsification attacks in VANETs using machine learning
Vimal et al. Enhance Software‐Defined Network Security with IoT for Strengthen the Encryption of Information Access Control
Heidari et al. Internet of Things intrusion detection systems: a comprehensive review and future directions
Zhu et al. Design guidelines on trust management for underwater wireless sensor networks
Amari et al. Trust management in vehicular ad-hoc networks: Extensive survey
Alsarhan et al. Machine learning-driven optimization for intrusion detection in smart vehicular networks
Subba et al. A game theory based multi layered intrusion detection framework for wireless sensor networks
El-Sayed et al. A novel multifaceted trust management framework for vehicular networks
Ghosal et al. A survey on energy efficient intrusion detection in wireless sensor networks
Iftikhar et al. Security provision by using detection and prevention methods to ensure trust in edge-based smart city networks
Chaudhary et al. Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks
Ahmad et al. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Su et al. Trusted opportunistic routing based on node trust model
Sangwan et al. A classification of misbehavior detection schemes for VANETs: a survey
Wang et al. Malicious node detection in wireless weak-link sensor networks using dynamic trust management
Kipongo et al. Artificial intelligence-based intrusion detection and prevention in edge-assisted SDWSN with modified honeycomb structure
Verma et al. PETRAK: A solution against DDoS attacks in vehicular networks
Batista et al. A survey on resilience in information sharing on networks: Taxonomy and applied techniques
Joshi et al. Hidden Markov trust for attenuation of selfish and malicious nodes in the IoT network
KR20220169584A (en) METHOD FOR SELECTING IoT OPTIMIZATION NODES AND REMOVING MALICIOUS NODES
Alemayehu et al. A systematic analysis on the use of AI techniques in industrial IoT DDoS attacks detection, mitigation and prevention
Amari et al. Prediction and detection model for hierarchical Software-Defined Vehicular Network
Vijayan et al. Trust management approaches in mobile adhoc networks
Abdulkareem et al. Blocollab: A Blockchain-aided Deep Learning Model for Hybrid and Collaborative Routing Attack Detection and Mitigation in RPL.
Sicari et al. Performance Comparison of Reputation Assessment Techniques Based on Self‐Organizing Maps in Wireless Sensor Networks