Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing

Jie CHEN, Ai-dong XU, Hong WEN, Wen-jie LIU, Yi-xin JIANG, Peng LI, Yu-shan LI


The edge computing performs data processing at the proximity of data collecting nodes, which makes the edge computing devices also face a series of malicious attacking, such as clone node attack, Sybil node attack and so on. However, such malicious attacks are hard to identify by the traditional security measures because the illegal nodes capture the keys of the legal nodes. In order to solve the above problems, a channel information approached malicious node recognition method based on intelligent algorithm for the edge computing is proposed. The novel algorithm is feasible and the recognition accuracy meets the requirements.


Intelligent Algorithm, Clone Node, Edge Computing, Sybil Node


Full Text:



  • There are currently no refbacks.