Reference Hub1
Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

Linjiang Xie, Feilu Hang, Wei Guo, Zhenhong Zhang, Hanruo Li
Copyright: © 2022 |Volume: 13 |Issue: 7 |Pages: 21
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781668474082|DOI: 10.4018/IJDST.307956
Cite Article Cite Article

MLA

Xie, Linjiang, et al. "Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems." IJDST vol.13, no.7 2022: pp.1-21. http://doi.org/10.4018/IJDST.307956

APA

Xie, L., Hang, F., Guo, W., Zhang, Z., & Li, H. (2022). Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems. International Journal of Distributed Systems and Technologies (IJDST), 13(7), 1-21. http://doi.org/10.4018/IJDST.307956

Chicago

Xie, Linjiang, et al. "Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems," International Journal of Distributed Systems and Technologies (IJDST) 13, no.7: 1-21. http://doi.org/10.4018/IJDST.307956

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.