Title
Mimic Defense Techniques of Edge-Computing Terminal
Abstract
In the current scenario, the sensor devices are extensively used to monitor water resources. And the edge-computing terminal is the link to connect the sensor nodes and services. However, due to the limitation of computer sources and the long-term operation of the sensor node, the risk of IoT node being maliciously forged is extremely high in the area of Edge-Computing terminal on water data. To encounter this problem, our aim is designing a mimic defense model which has a high defensive ability evaluation. This paper proposes the characteristics of comprehensive, dynamic, heterogeneous and redundant. Based on the idea of mimic defense, this paper establishes the mimic defense model of the Edge-Computing terminal. It is dependent on the network attack chain and the mimic defense system with characteristics of dynamic, heterogeneousness and redundancy. The model has the ability to the conduct computation solution of the security according to some related factor parameters such as attack ability, heterogeneity degree, and dynamic transformation. It can solve the probability of a successful attack on each key node.
Year
DOI
Venue
2019
10.1109/BigDataService.2019.00043
2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService)
Keywords
Field
DocType
Edge-Computing Terminal,Mimic Defense,Cybersecurity
Edge computing,Sensor node,Data mining,Computer science,Internet of Things,Redundancy (engineering),Network attack,Computation,Distributed computing
Conference
ISBN
Citations 
PageRank 
978-1-7281-0060-9
0
0.34
References 
Authors
0
2
Name
Order
Citations
PageRank
Xiaonan Sang100.34
Li Qian-Mu23314.78