{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T15:34:29Z","timestamp":1773070469509,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key R&D Program of China under Grant","award":["2019YFB2102400"],"award-info":[{"award-number":["2019YFB2102400"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-021-03410-4","type":"journal-article","created":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T11:03:51Z","timestamp":1631963031000},"page":"303-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9392-0655","authenticated-orcid":false,"given":"Ziyu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yueming","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Huiping","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Jinxin","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,18]]},"reference":[{"issue":"8","key":"3410_CR1","doi-asserted-by":"publisher","first-page":"6722","DOI":"10.1109\/JIOT.2020.3004500","volume":"7","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Peng, M., Shou, G., Chen, Y., Chen, S.: Toward edge intelligence: multiaccess edge computing for 5g and internet of things. IEEE Internet Things J. 7(8), 6722\u20136747 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"3410_CR2","doi-asserted-by":"publisher","first-page":"4946","DOI":"10.1109\/JIOT.2019.2897619","volume":"6","author":"D Liu","year":"2019","unstructured":"Liu, D., Yan, Z., Ding, W., Atiquzzaman, M.: A survey on secure data analytics in edge computing. IEEE Internet Things J. 6(3), 4946\u20134967 (2019)","journal-title":"IEEE Internet Things J."},{"key":"3410_CR3","doi-asserted-by":"crossref","unstructured":"Khurpade, J.M., Rao, D., Sanghavi, P.D.: A survey on iot and 5g network. In: 2018 International conference on smart city and emerging technology (ICSCET), pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/ICSCET.2018.8537340"},{"key":"3410_CR4","doi-asserted-by":"crossref","unstructured":"Hameed, A., Alomary, A.: Security issues in iot: A survey. In: 2019 International conference on innovation and intelligence for informatics, computing, and technologies (3ICT), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/3ICT.2019.8910320"},{"key":"3410_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2997077","author":"Z Gu","year":"2020","unstructured":"Gu, Z., Wang, Y., Shen, T., Lau, F.C.: On heterogeneous sensing capability for distributed rendezvous in cognitive radio networks. IEEE Trans. Mobile Comput. (2020). https:\/\/doi.org\/10.1109\/TMC.2020.2997077","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"7","key":"3410_CR6","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","volume":"15","author":"Z Tian","year":"2019","unstructured":"Tian, Z., Shi, W., Wang, Y., Zhu, C., Du, X., Su, S., Sun, Y., Guizani, N.: Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inform. 15(7), 4285\u20134294 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"3410_CR7","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.32604\/cmc.2020.011834","volume":"65","author":"Z Gu","year":"2020","unstructured":"Gu, Z., Su, Y., Liu, C., Lyu, Y., Jian, Y., Li, H., Cao, Z., Wang, L.: Adversarial attacks on license plate recognition systems. CMC-Comput. Mater. Continua 65(2), 1437\u20131452 (2020)","journal-title":"CMC-Comput. Mater. Continua"},{"key":"3410_CR8","doi-asserted-by":"crossref","unstructured":"Hu, N., Tian, Z., Lu, H., Du, X., Guizani, M.: A multiple-kernel clustering based intrusion detection scheme for 5g and iot networks. Int. J. Mach. Learn. Cybern. 1\u201316 (2021)","DOI":"10.1007\/s13042-020-01253-w"},{"key":"3410_CR9","doi-asserted-by":"crossref","unstructured":"Datta, P., Sharma, B.: A survey on iot architectures, protocols, security and smart city based applications. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICCCNT.2017.8203943"},{"issue":"8","key":"3410_CR10","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"key":"3410_CR11","doi-asserted-by":"publisher","first-page":"54508","DOI":"10.1109\/ACCESS.2019.2913438","volume":"7","author":"D Wang","year":"2019","unstructured":"Wang, D., Bai, B., Lei, K., Zhao, W., Yang, Y., Han, Z.: Enhancing information security via physical layer approaches in heterogeneous iot with multiple access mobile edge computing in smart city. IEEE Access 7, 54508\u201354521 (2019)","journal-title":"IEEE Access"},{"issue":"11","key":"3410_CR12","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1109\/JSAC.2017.2760478","volume":"35","author":"SN Shirazi","year":"2017","unstructured":"Shirazi, S.N., Gouglidis, A., Farshad, A., Hutchison, D.: The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J. Sel. Areas Commun. 35(11), 2586\u20132595 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"3410_CR13","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682\u20134696 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"3410_CR14","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","volume":"23","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera, P., Jurcut, A.D., Liyanage, M.: Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutor. 23(2), 1078\u20131124 (2021)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3410_CR15","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Durresi, A., Uslu, S.: Trust assessment for internet of things in multi-access edge computing. In: 2018 IEEE 32nd International conference on advanced information networking and applications (AINA), pp. 1155\u20131161. IEEE (2018)","DOI":"10.1109\/AINA.2018.00165"},{"issue":"1","key":"3410_CR16","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11235-016-0168-0","volume":"64","author":"KC Park","year":"2017","unstructured":"Park, K.C., Shin, D.H.: Security assessment framework for iot service. Telecommun. Syst. 64(1), 193\u2013209 (2017)","journal-title":"Telecommun. Syst."},{"key":"3410_CR17","doi-asserted-by":"publisher","first-page":"101283","DOI":"10.1016\/j.phycom.2021.101283","volume":"45","author":"S Lai","year":"2021","unstructured":"Lai, S., Zhao, R., Tang, S., Xia, J., Zhou, F., Fan, L.: Intelligent secure mobile edge computing for beyond 5g wireless networks. Phys. Commun. 45, 101283 (2021)","journal-title":"Phys. Commun."},{"key":"3410_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3034066","author":"H Peng","year":"2020","unstructured":"Peng, H., Kan, Z., Liu, C., Baker, T., Zhao, D.: Risk assessment of cps composed of edge consumer electronics under intentional attack. IEEE Consum. Electron. Mag. (2020). https:\/\/doi.org\/10.1109\/MCE.2020.3034066","journal-title":"IEEE Consum. Electron. Mag."},{"key":"3410_CR19","doi-asserted-by":"crossref","unstructured":"Shrestha, M., Johansen, C., Noll, J.: Building confidence using beliefs and arguments in security class evaluations for iot. In: 2020 Fifth International conference on fog and mobile edge computing (FMEC), pp. 244\u2013249. IEEE (2020)","DOI":"10.1109\/FMEC49853.2020.9144957"},{"key":"3410_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Tian, Y., Li, F., Yang, H., Ma, Z., Rong, G.: Research on edge intelligence-based security analysis method for power operation system. In: 2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)\/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp. 258\u2013263. IEEE (2020)","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00052"},{"key":"3410_CR21","doi-asserted-by":"crossref","unstructured":"Huang, Y.L., Sun, W.L.: An ahp-based risk assessment for an industrial iot cloud. In: 2018 IEEE international conference on software quality, reliability and security companion (QRS-C), pp. 637\u2013638. IEEE (2018)","DOI":"10.1109\/QRS-C.2018.00112"},{"key":"3410_CR22","doi-asserted-by":"crossref","unstructured":"Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N., Urien, P.: A new threat assessment method for integrating an iot infrastructure in an information system. In: 2017 IEEE 37th international conference on distributed computing systems workshops (ICDCSW), pp. 105\u2013112. IEEE (2017)","DOI":"10.1109\/ICDCSW.2017.22"},{"key":"3410_CR23","unstructured":"Part, C.: 2, common criteria for information technology security evaluation (version 3.1, revision 4) part 2: Part 2: security functional requirements (iso\/iec 15408-2) (2012)"},{"key":"3410_CR24","doi-asserted-by":"crossref","unstructured":"Hogan, M., Piccarreta, B., Group, I.I.C.S.W., et\u00a0al.: Interagency report on status of international cybersecurity standardization for the internet of things (iot). Tech. rep., National Institute of Standards and Technology (2018)","DOI":"10.6028\/NIST.IR.8200"},{"key":"3410_CR25","unstructured":"Patel, M., Naughton, B., Chan, C., Sprecher, N., Abeta, S., Neal, A., et\u00a0al.: Mobile-edge computing introductory technical white paper. White paper, mobile-edge computing (MEC) industry initiative 29, 854\u2013864 (2014)"},{"issue":"6","key":"3410_CR26","first-page":"64","volume":"36","author":"P Sanming","year":"2020","unstructured":"Sanming, P., Mingqiang, Y.: System and application of video surrveillance based on edge computing. Telecommun. Sci. 36(6), 64 (2020)","journal-title":"Telecommun. Sci."},{"key":"3410_CR27","first-page":"1","volume-title":"Introduction to edge computing in iiot","author":"M Tseng","year":"2018","unstructured":"Tseng, M., Canaran, T., Canaran, L.I.: Introduction to edge computing in iiot, pp. 1\u201319. Industrial Internet Consortium, Needham, MA (2018)"},{"key":"3410_CR28","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on iot security: application areas, security threats, and solution architectures. IEEE Access 7, 82721\u201382743 (2019)","journal-title":"IEEE Access"},{"key":"3410_CR29","volume-title":"Google\u2019s PageRank and Beyond: The Science of Search Engine Rankings","author":"AN Langville","year":"2011","unstructured":"Langville, A.N., Meyer, C.D.: Google\u2019s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, Princeton (2011)"},{"issue":"5","key":"3410_CR30","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/S1001-0742(06)60032-6","volume":"18","author":"ZH Zou","year":"2006","unstructured":"Zou, Z.H., Yi, Y., Sun, J.N.: Entropy method for determination of weight of evaluating indicators in fuzzy synthetic evaluation for water quality assessment. J. Environ. Sci. 18(5), 1020\u20131023 (2006)","journal-title":"J. Environ. Sci."},{"issue":"1","key":"3410_CR31","first-page":"1","volume":"1","author":"D Julong","year":"1989","unstructured":"Julong, D.: Introduction to grey system theory. J. Grey Syst. 1(1), 1\u201324 (1989)","journal-title":"J. Grey Syst."},{"key":"3410_CR32","doi-asserted-by":"crossref","unstructured":"Luo, H., Shen, Y., Zhang, G., Huang, L.: Information security risk assessment based on two stages decision model with grey synthetic measure. In: 2015 6th IEEE international conference on software engineering and service science (ICSESS), pp.795\u2013798. IEEE (2015)","DOI":"10.1109\/ICSESS.2015.7339176"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03410-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:12:37Z","timestamp":1677507157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03410-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,18]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3410"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03410-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,18]]},"assertion":[{"value":"6 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}