Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing

2019 
The edge computing performs data processing at the proximity of data collecting nodes, which makes the edge computing devices also face a series of malicious attacking, such as clone node attack, Sybil node attack and so on. However, such malicious attacks are hard to identify by the traditional security measures because the illegal nodes capture the keys of the legal nodes. In order to solve the above problems, a channel information approached malicious node recognition method based on intelligent algorithm for the edge computing is proposed. The novel algorithm is feasible and the recognition accuracy meets the requirements.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []