【24h】

Mimic Defense Techniques of Edge-Computing Terminal

机译:边缘计算终端的模拟防御技术

获取原文

摘要

In the current scenario, the sensor devices are extensively used to monitor water resources. And the edge-computing terminal is the link to connect the sensor nodes and services. However, due to the limitation of computer sources and the long-term operation of the sensor node, the risk of IoT node being maliciously forged is extremely high in the area of Edge-Computing terminal on water data. To encounter this problem, our aim is designing a mimic defense model which has a high defensive ability evaluation. This paper proposes the characteristics of comprehensive, dynamic, heterogeneous and redundant. Based on the idea of mimic defense, this paper establishes the mimic defense model of the Edge-Computing terminal. It is dependent on the network attack chain and the mimic defense system with characteristics of dynamic, heterogeneousness and redundancy. The model has the ability to the conduct computation solution of the security according to some related factor parameters such as attack ability, heterogeneity degree, and dynamic transformation. It can solve the probability of a successful attack on each key node.
机译:在当前情况下,传感器设备被广泛用于监测水资源。边缘计算终端是连接传感器节点和服务的链接。但是,由于计算机资源的限制以及传感器节点的长期运行,在水数据的边缘计算终端区域中,IoT节点被恶意伪造的风险非常高。为了解决这个问题,我们的目的是设计一种具有较高防御能力评价的模拟防御模型。本文提出了综合性,动态性,异构性和冗余性的特征。基于模拟防御的思想,建立了边缘计算终端的模拟防御模型。它依赖于具有动态,异构和冗余特性的网络攻击链和模拟防御系统。该模型具有根据攻击能力,异构度和动态变换等一些相关因素参数进行安全性计算的能力。它可以解决对每个关键节点成功攻击的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号