Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/36232
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAliyu, F-
dc.contributor.authorSheltami, T-
dc.contributor.authorMahmoud, A-
dc.contributor.authorAl-Awami, L-
dc.contributor.authorYASAR, Ansar-
dc.date.accessioned2021-12-16T08:47:48Z-
dc.date.available2021-12-16T08:47:48Z-
dc.date.issued2021-
dc.date.submitted2021-08-27T12:47:21Z-
dc.identifier.citationCMC-Computers Materials & Continua, 69 (1) , p. 1159 -1181-
dc.identifier.urihttp://hdl.handle.net/1942/36232-
dc.description.abstractFog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomalybased Intrusion Detection and Prevention System (IDPS) against Man-in-theMiddle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect intrusion in the network. They periodically monitor the behavior of the fog nodes in the network. Any deviation from normal network activity is categorized as malicious, and the suspected node is isolated. Exponentially Weighted Moving Average (EWMA) is added to the system to smooth out the noise that is typically found in social media communications. Our results (with 95% confidence) show that the accuracy of the proposed system increases from 80% to 95% after EWMA is added. Also, with EWMA, the proposed system can detect the intrusion from 0.25- 0.5 s seconds faster than that without EWMA. However, it affects the latency of services provided by the fog nodes by at least 0.75-1.3 s. Finally, EWMA has not increased the energy overhead of the system, due to its lightweight.-
dc.description.sponsorshipThe Authors would like to acknowledge the support of King Fahd University of Petroleum and Minerals for this research-
dc.language.isoen-
dc.publisherTECH SCIENCE PRESS-
dc.rightsThis work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.-
dc.subject.otherFog computing-
dc.subject.otherman-in-the-middle attack-
dc.subject.otherintrusion detection system and prevention system-
dc.subject.othernetwork security-
dc.subject.othersocial media-
dc.titleDetecting Man-in-the-Middle Attack in Fog Computing for Social Media-
dc.typeJournal Contribution-
dc.identifier.epage1181-
dc.identifier.issue1-
dc.identifier.spage1159-
dc.identifier.volume69-
local.bibliographicCitation.jcatA1-
local.publisher.place871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052 USA-
local.type.refereedRefereed-
local.type.specifiedArticle-
dc.identifier.doi10.32604/cmc.2021.016938-
dc.identifier.isi000659047600018-
local.provider.typeWeb of Science-
local.uhasselt.internationalyes-
item.fullcitationAliyu, F; Sheltami, T; Mahmoud, A; Al-Awami, L & YASAR, Ansar (2021) Detecting Man-in-the-Middle Attack in Fog Computing for Social Media. In: CMC-Computers Materials & Continua, 69 (1) , p. 1159 -1181.-
item.contributorAliyu, F-
item.contributorSheltami, T-
item.contributorMahmoud, A-
item.contributorAl-Awami, L-
item.contributorYASAR, Ansar-
item.validationecoom 2022-
item.accessRightsOpen Access-
item.fulltextWith Fulltext-
crisitem.journal.issn1546-2218-
crisitem.journal.eissn1546-2226-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
Detecting Man-in-the-Middle Attack in Fog Computing for Social Media.pdfPublished version1.16 MBAdobe PDFView/Open
Show simple item record

WEB OF SCIENCETM
Citations

4
checked on May 2, 2024

Page view(s)

116
checked on Sep 7, 2022

Download(s)

170
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.