SCIENCE CHINA Information Sciences, Volume 63 , Issue 12 : 220302(2020) https://doi.org/10.1007/s11432-019-2906-y

Security in edge-assisted Internet of Things: challenges and solutions

More info
  • ReceivedDec 2, 2019
  • AcceptedMay 12, 2020
  • PublishedNov 2, 2020



[1] Ejaz W, Anpalagan A, Imran M A. Internet of Things (IoT) in 5G Wireless Communications. IEEE Access, 2016, 4: 10310-10314 CrossRef Google Scholar

[2] Zhang K, Ni J, Yang K. Security and Privacy in Smart City Applications: Challenges and Solutions. IEEE Commun Mag, 2017, 55: 122-129 CrossRef Google Scholar

[3] Ni J, Zhang K, Lin X. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions. IEEE Commun Surv Tutorials, 2018, 20: 601-628 CrossRef Google Scholar

[4] Xiao Y, Jia Y, Liu C. Edge Computing Security: State of the Art and Challenges. Proc IEEE, 2019, 107: 1608-1631 CrossRef Google Scholar

[5] Shirazi S N, Gouglidis A, Farshad A. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective. IEEE J Sel Areas Commun, 2017, 35: 2586-2595 CrossRef Google Scholar

[6] Antonakakis M, April T, Bailey M, et al. Understanding the mirai botnet. In: Proceedings of the 26th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 17), 2017. 1093--1110. Google Scholar

[7] Roman R, Lopez J, Mambo M. Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Comput Syst, 2018, 78: 680-698 CrossRef Google Scholar

[8] Ni J, Lin X, Shen X S. Toward edge-assisted internet of things: from security and efficiency perspectives. IEEE Network, 2019. 33: 50--57. Google Scholar

[9] Liu D, Yan Z, Ding W. A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J, 2019, 6: 4946-4967 CrossRef Google Scholar

[10] Liu Z, Yin X, Hu Y. CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning. IEEE Access, 2020, 8: 42120-42130 CrossRef Google Scholar

[11] Xiao L, Xie C, Chen T. A Mobile Offloading Game Against Smart Attacks. IEEE Access, 2016, 4: 2281-2291 CrossRef Google Scholar

[12] Shi C, Liu J, Liu H, et al. Smart user authentication through actuation of daily activities leveraging wifi-enabled iot. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017. 1--10. Google Scholar

[13] Hlavacs H, Treutner T, Gelas J P, et al. Energy consumption side-channel attack at virtual machines in a cloud. In: Proceedings of 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, 2011. 605--612. Google Scholar

[14] Zhang K, Yang K, Liang X. Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Commun, 2015, 22: 104-112 CrossRef Google Scholar

[15] Kolias C, Kambourakis G, Stavrou A. DDoS in the IoT: Mirai and Other Botnets. Computer, 2017, 50: 80-84 CrossRef Google Scholar

[16] Martin M C, Lam M S. Automatic generation of xss and sql injection attacks with goal-directed model checking. In: Proceedings of USENIX Security Symposium, 2008. 31--44. Google Scholar

[17] Livadas C, Walsh R, Lapsley D, et al. Usilng machine learning technliques to identify botnet traffic. In: Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006. 967--974. Google Scholar

[18] Zolotukhin M, Hämäläinen T, Kokkonen T, et al. Increasing web service availability by detecting application-layer ddos attacks in encrypted traffic. In: Proceedings of the 23rd International Conference on Telecommunications (ICT), 2016. 1--6. Google Scholar

[19] Niyaz Q, Sun W, Javaid A Y. A deep learning based ddos detection system in software-defined networking (sdn). 2016,. arXiv Google Scholar

[20] Chua Z L, Shen S, Saxena P, et al. Neural nets can learn function type signatures from binaries. In: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), 2017. 99--116. Google Scholar

[21] Song W, Yin H, Liu C, et al. Deepmem: Learning graph neural network models for fast and robust memory forensic analysis. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018. 606--618. Google Scholar

[22] Zuo F, Li X, Young P, et al. Neural machine translation inspired binary code similarity comparison beyond function pairs. 2018,. arXiv Google Scholar

[23] Jackson K A, Bennett B T. Locating sql injection vulnerabilities in java byte code using natural language techniques. In: Proceedings of SoutheastCon 2018, 2018. 1--5. Google Scholar

[24] Ross K, Moh M, Moh T S, et al. Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. In: Proceedings of the ACMSE 2018 Conference, 2018. 1--8. Google Scholar

[25] Rathore S, Sharma P K, Park J H. XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs. J Inf Process Syst, 2017, CrossRef Google Scholar

[26] Murofushi T, Sugeno M. An interpretation of fuzzy measures and the Choquet integral as an integral with respect to a fuzzy measure. Fuzzy Sets Syst, 1989, 29: 201-227 CrossRef Google Scholar