Iftikhar et al., 2023 - Google Patents
Security provision by using detection and prevention methods to ensure trust in edge-based smart city networksIftikhar et al., 2023
View PDF- Document ID
- 14278611314820329741
- Author
- Iftikhar A
- Qureshi K
- Altalbe A
- Javeed K
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks. Edge Computing (EC) has gained attention due to its distributive nature that brings computing resources …
- 238000000034 method 0 title abstract description 58
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ercan et al. | Misbehavior detection for position falsification attacks in VANETs using machine learning | |
| Vimal et al. | Enhance Software‐Defined Network Security with IoT for Strengthen the Encryption of Information Access Control | |
| Heidari et al. | Internet of Things intrusion detection systems: a comprehensive review and future directions | |
| Zhu et al. | Design guidelines on trust management for underwater wireless sensor networks | |
| Amari et al. | Trust management in vehicular ad-hoc networks: Extensive survey | |
| Alsarhan et al. | Machine learning-driven optimization for intrusion detection in smart vehicular networks | |
| Subba et al. | A game theory based multi layered intrusion detection framework for wireless sensor networks | |
| El-Sayed et al. | A novel multifaceted trust management framework for vehicular networks | |
| Ghosal et al. | A survey on energy efficient intrusion detection in wireless sensor networks | |
| Iftikhar et al. | Security provision by using detection and prevention methods to ensure trust in edge-based smart city networks | |
| Chaudhary et al. | Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks | |
| Ahmad et al. | Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network | |
| Su et al. | Trusted opportunistic routing based on node trust model | |
| Sangwan et al. | A classification of misbehavior detection schemes for VANETs: a survey | |
| Wang et al. | Malicious node detection in wireless weak-link sensor networks using dynamic trust management | |
| Kipongo et al. | Artificial intelligence-based intrusion detection and prevention in edge-assisted SDWSN with modified honeycomb structure | |
| Verma et al. | PETRAK: A solution against DDoS attacks in vehicular networks | |
| Batista et al. | A survey on resilience in information sharing on networks: Taxonomy and applied techniques | |
| Joshi et al. | Hidden Markov trust for attenuation of selfish and malicious nodes in the IoT network | |
| KR20220169584A (en) | METHOD FOR SELECTING IoT OPTIMIZATION NODES AND REMOVING MALICIOUS NODES | |
| Alemayehu et al. | A systematic analysis on the use of AI techniques in industrial IoT DDoS attacks detection, mitigation and prevention | |
| Amari et al. | Prediction and detection model for hierarchical Software-Defined Vehicular Network | |
| Vijayan et al. | Trust management approaches in mobile adhoc networks | |
| Abdulkareem et al. | Blocollab: A Blockchain-aided Deep Learning Model for Hybrid and Collaborative Routing Attack Detection and Mitigation in RPL. | |
| Sicari et al. | Performance Comparison of Reputation Assessment Techniques Based on Self‐Organizing Maps in Wireless Sensor Networks |