Skip to main content
Erschienen in: International Journal of Information Security 3/2022

09.09.2021 | regular contribution

Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud

verfasst von: Saleh A. Alghamdi

Erschienen in: International Journal of Information Security | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues in MANETs. Security is highly important in MANET and cloud environments for preventing harmful attacks. Therefore, a trusted environment is required for a MANET with cloud-based 5G communications. In this paper, we propose a new framework called trust-aware intrusion detection and prevention system (TA-IDPS) for protecting the network from adversaries. TA-IDPS consists of a MANET, a cloudlet, and a cloud service layer. Initially, we register and authenticate mobile nodes using an ultra-lightweight symmetric cryptographic technique, which is highly suitable for resource-constrained environments. In MANETs, high energy consumption, scalability, and authentication are important issues, which are addressed by the proposed moth flame optimization algorithm. If the cluster head (CH) receives data packets from a source node, they are classified as normal, malicious, and suspicious using a deep belief network. Intra-cluster routing is implemented by an adaptive Bayesian estimator using next-best forwarder selection. In the cloudlet layer, cloudlets are used to aggregate packets from the CH and verify their legitimacy so that they can be forwarded to the cloud service layer. Each cloudlet is provided with a peek monitor for classifying suspicious packets as malicious and normal using Awads information entropy. Experiments are conducted using NS3.26. The performance of the proposed TA-IDPS and previous methods is analyzed using widely used metrics. The evaluation results demonstrated that the proposed TA-IDPS system outperformed the previous methods in terms of all metrics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (2010) Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (2010)
2.
Zurück zum Zitat Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mobile Comput. 16(16), 2572–2589 (2016)CrossRef Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mobile Comput. 16(16), 2572–2589 (2016)CrossRef
3.
Zurück zum Zitat Lacuesta, R., Lloret, J., Sendra, S., Peñalver, L.: Spontaneous ad hoc mobile cloud computing network. Sci. World J. 2014, 1–19 (2014)CrossRef Lacuesta, R., Lloret, J., Sendra, S., Peñalver, L.: Spontaneous ad hoc mobile cloud computing network. Sci. World J. 2014, 1–19 (2014)CrossRef
4.
Zurück zum Zitat Alghamdi, S.A.: Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wirel. Netw. 22(4), 1355–1363 (2015)CrossRef Alghamdi, S.A.: Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wirel. Netw. 22(4), 1355–1363 (2015)CrossRef
6.
Zurück zum Zitat Alnumay, W., Ghosh, U., Chatterjee, P.: A trust-based predictive model for mobile ad hoc network in internet of things. Sensors 19(6), 1467 (2019)CrossRef Alnumay, W., Ghosh, U., Chatterjee, P.: A trust-based predictive model for mobile ad hoc network in internet of things. Sensors 19(6), 1467 (2019)CrossRef
7.
Zurück zum Zitat Belgaum, M.R., Musa, S., Su’ud, M.M., Alam, M., Soomro, S., Alansari, Z.: Secured approach towards reactive routing protocols using triple factor in mobile adhoc networks. Ann. Emerg. Technol. Comput. 3, 32–40 (2019)CrossRef Belgaum, M.R., Musa, S., Su’ud, M.M., Alam, M., Soomro, S., Alansari, Z.: Secured approach towards reactive routing protocols using triple factor in mobile adhoc networks. Ann. Emerg. Technol. Comput. 3, 32–40 (2019)CrossRef
8.
Zurück zum Zitat Zhang, San-shun, Wang, Shi-wen, Hui, Xia, Cheng, Xiang-guo: An attack-resistant reputation management system for mobile ad hoc networks. Proc. Comput. Sci. 147, 473–479 (2019)CrossRef Zhang, San-shun, Wang, Shi-wen, Hui, Xia, Cheng, Xiang-guo: An attack-resistant reputation management system for mobile ad hoc networks. Proc. Comput. Sci. 147, 473–479 (2019)CrossRef
10.
Zurück zum Zitat Gurung, S., Chauhan, S.: Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 25(3), 975–988 (2017)CrossRef Gurung, S., Chauhan, S.: Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 25(3), 975–988 (2017)CrossRef
11.
Zurück zum Zitat Roles, A., ElAarag, H.: Coexistence with malicious and selfish nodes in wireless ad hoc networks: a Bayesian game approach. J. Algorithms Comput. Technol. 11(4), 353–365 (2017)MathSciNetCrossRef Roles, A., ElAarag, H.: Coexistence with malicious and selfish nodes in wireless ad hoc networks: a Bayesian game approach. J. Algorithms Comput. Technol. 11(4), 353–365 (2017)MathSciNetCrossRef
12.
Zurück zum Zitat Taheri, Yaser, Gharaee, Hossein, Mohammadzadeh, Naser: A game theory approach for malicious node detection in MANETs. J. Inf. Sci. Eng. 32, 559–573 (2016)MathSciNet Taheri, Yaser, Gharaee, Hossein, Mohammadzadeh, Naser: A game theory approach for malicious node detection in MANETs. J. Inf. Sci. Eng. 32, 559–573 (2016)MathSciNet
14.
Zurück zum Zitat Yasin, A., Abu-Zant Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security Commun Netw. 1–12 (2019) Yasin, A., Abu-Zant Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security Commun Netw. 1–12 (2019)
15.
Zurück zum Zitat Elwahsh, H., Gamal, M., Salama, A., Henawy, I.: A Novel approach for classify MANETs attacks with a neutrosophic intelligent system based on genetic algorithm. Secur. Commun. Netw (2018) Elwahsh, H., Gamal, M., Salama, A., Henawy, I.: A Novel approach for classify MANETs attacks with a neutrosophic intelligent system based on genetic algorithm. Secur. Commun. Netw (2018)
16.
Zurück zum Zitat Karlsson, J., Dooley, L. S., Pulkkis, G.: Secure routing for MANET connected internet of things systems. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (2018) Karlsson, J., Dooley, L. S., Pulkkis, G.: Secure routing for MANET connected internet of things systems. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (2018)
17.
Zurück zum Zitat Sultana, J., Ahmed, T.: Elliptic curve cryptography based data transmission against blackhole attack in MANET. Int. J. Electr. Comput. Eng. (IJECE) 8, 4412 (2018)CrossRef Sultana, J., Ahmed, T.: Elliptic curve cryptography based data transmission against blackhole attack in MANET. Int. J. Electr. Comput. Eng. (IJECE) 8, 4412 (2018)CrossRef
18.
Zurück zum Zitat Aranganathan, A., Suriyakala, C.D.: An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 10, 3493–3503 (2019). https://doi.org/10.1007/s12652-018-1069-8 Aranganathan, A., Suriyakala, C.D.: An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 10, 3493–3503 (2019). https://​doi.​org/​10.​1007/​s12652-018-1069-8
19.
Zurück zum Zitat Alam, T., Benaida, M.: The role of cloud-MANET framework in the Internet of Things (IoT). Int. J. Online Eng. (iJOE) 14, 97–111 (2018)CrossRef Alam, T., Benaida, M.: The role of cloud-MANET framework in the Internet of Things (IoT). Int. J. Online Eng. (iJOE) 14, 97–111 (2018)CrossRef
20.
Zurück zum Zitat Li, J., Li, X., Gao, Y., Gao, Y., Zhang, R.: Dynamic cloudlet-assisted energy-saving routing mechanism for mobile ad hoc networks. IEEE Access 5, 20908–20920 (2017)CrossRef Li, J., Li, X., Gao, Y., Gao, Y., Zhang, R.: Dynamic cloudlet-assisted energy-saving routing mechanism for mobile ad hoc networks. IEEE Access 5, 20908–20920 (2017)CrossRef
21.
Zurück zum Zitat Naveena, A., Reddy, K.R.L.: Malicious node prevention and mitigation in MANETs using a hybrid security model. Inf. Secur. J. Global Perspect. 27(2), 92–101 (2018)CrossRef Naveena, A., Reddy, K.R.L.: Malicious node prevention and mitigation in MANETs using a hybrid security model. Inf. Secur. J. Global Perspect. 27(2), 92–101 (2018)CrossRef
22.
Zurück zum Zitat Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, A.: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mobile Comput. 16(8), 2174–2183 (2017)CrossRef Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, A.: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mobile Comput. 16(8), 2174–2183 (2017)CrossRef
23.
Zurück zum Zitat Yasin, A., Abu Zant, M.: Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mobile Comput. 2018, 1–10 (2018)CrossRef Yasin, A., Abu Zant, M.: Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mobile Comput. 2018, 1–10 (2018)CrossRef
24.
Zurück zum Zitat Singh, O., Singh, J., Singh, R.: Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput. 21(1), 51–63 (2017)CrossRef Singh, O., Singh, J., Singh, R.: Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput. 21(1), 51–63 (2017)CrossRef
25.
Zurück zum Zitat Guo, Y., Zhang, H., Zhang, L., Fang, L., Li, F.: A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30, 118–126 (2019)MathSciNetCrossRef Guo, Y., Zhang, H., Zhang, L., Fang, L., Li, F.: A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30, 118–126 (2019)MathSciNetCrossRef
26.
Zurück zum Zitat Xia, H., Cheng, X., Zheng, Y., Liu, A.: A novel light-weight subjective trust inference framework in MANETs. IEEE Trans. Sustain. Comput. 1–1 (2018) Xia, H., Cheng, X., Zheng, Y., Liu, A.: A novel light-weight subjective trust inference framework in MANETs. IEEE Trans. Sustain. Comput. 1–1 (2018)
27.
Zurück zum Zitat Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K., Pathan, M., Hussain, M., Memon, M.: A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3), 61 (2019)CrossRef Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K., Pathan, M., Hussain, M., Memon, M.: A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3), 61 (2019)CrossRef
28.
Zurück zum Zitat Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. Int. J. Inf. Technol. 11(2), 345–356 (2018) Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. Int. J. Inf. Technol. 11(2), 345–356 (2018)
29.
Zurück zum Zitat Sen, B., Meitei, M. G., Sharma, K., Ghose, M.K., Sinha, S.: A trust-based intrusion detection system for mitigating blackhole attacks in MANET. In: Advanced Computational and Communication Paradigms, pp. 765–775 (2018) Sen, B., Meitei, M. G., Sharma, K., Ghose, M.K., Sinha, S.: A trust-based intrusion detection system for mitigating blackhole attacks in MANET. In: Advanced Computational and Communication Paradigms, pp. 765–775 (2018)
30.
Zurück zum Zitat Singh, K., Singh, K.: Intrusion detection and recovery of MANET by using ACO algorithm and genetic algorithm. Next-Generation Networks, pp. 97–109 (2017) Singh, K., Singh, K.: Intrusion detection and recovery of MANET by using ACO algorithm and genetic algorithm. Next-Generation Networks, pp. 97–109 (2017)
31.
Zurück zum Zitat Vaseer, G., Ghai, G., Ghai, D.: Novel intrusion detection and prevention for mobile Ad hoc networks: a single-and multiattack case study. IEEE Consum. Electron. Mag. 8(3), 35–39 (2019)CrossRef Vaseer, G., Ghai, G., Ghai, D.: Novel intrusion detection and prevention for mobile Ad hoc networks: a single-and multiattack case study. IEEE Consum. Electron. Mag. 8(3), 35–39 (2019)CrossRef
32.
Zurück zum Zitat Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10, 16 (2018)CrossRef Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10, 16 (2018)CrossRef
33.
Zurück zum Zitat Alnumay, W., Ghosh, U., Chatterjee, P.: A trust based predictive model for mobile Ad hoc network in internet of things. Sensors 19(6), 1–14 (2019)CrossRef Alnumay, W., Ghosh, U., Chatterjee, P.: A trust based predictive model for mobile Ad hoc network in internet of things. Sensors 19(6), 1–14 (2019)CrossRef
34.
Zurück zum Zitat Cai, R.J., Li, X.J., Chong, P.H.J.H.J.: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans. Mob. Comput. 18(1), 42–55 (2019)CrossRef Cai, R.J., Li, X.J., Chong, P.H.J.H.J.: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans. Mob. Comput. 18(1), 42–55 (2019)CrossRef
35.
Zurück zum Zitat Marathe, N., Shinde, S.K.: ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing, Wirel. Pers. Commun. 1–24 (2019) Marathe, N., Shinde, S.K.: ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing, Wirel. Pers. Commun. 1–24 (2019)
36.
Zurück zum Zitat Dbouk, T., Mourad, A., Otrok, H., Talhi, C.: Towards ad-hoc cloud based approach for mobile intrusion detection. In: 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. (2016). https://doi.org/10.1109/WiMOB.2016.7763251 Dbouk, T., Mourad, A., Otrok, H., Talhi, C.: Towards ad-hoc cloud based approach for mobile intrusion detection. In: 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. (2016). https://​doi.​org/​10.​1109/​WiMOB.​2016.​7763251
37.
Zurück zum Zitat Shila, D.M., Shen, W., Cheng, Y., Tian, X., Shen, X.S.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)CrossRef Shila, D.M., Shen, W., Cheng, Y., Tian, X., Shen, X.S.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)CrossRef
38.
Zurück zum Zitat Gautam, D., Tokekar, V.: An approach to analyze the impact of DDOS attack on mobile cloud computing. In: 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) (2017) Gautam, D., Tokekar, V.: An approach to analyze the impact of DDOS attack on mobile cloud computing. In: 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) (2017)
39.
Zurück zum Zitat Chen, M., Wang, N., Zhou, H., Chen, Y.: FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Comput. Electr. Eng. 71, 978–987 (2018)CrossRef Chen, M., Wang, N., Zhou, H., Chen, Y.: FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Comput. Electr. Eng. 71, 978–987 (2018)CrossRef
40.
Zurück zum Zitat Abbas, S., Faisal, M., Rahman, H.U., Khan, M.Z., Merabti, M., Khan, A.: Masquerading attacks detection in mobile ad hoc networks. IEEE Access 6, 55013–55025 (2018)CrossRef Abbas, S., Faisal, M., Rahman, H.U., Khan, M.Z., Merabti, M., Khan, A.: Masquerading attacks detection in mobile ad hoc networks. IEEE Access 6, 55013–55025 (2018)CrossRef
41.
Zurück zum Zitat Sowah, R.A., Ofori-Amanfo, K.B., Mills, G.A., Koumadi, K.M.: Detection and prevention of man-in-the-middle spoofing attacks in manets using predictive techniques in artificial neural networks (ANN). J. Comput. Netw. Commun. 2019, 1–14 (2019)CrossRef Sowah, R.A., Ofori-Amanfo, K.B., Mills, G.A., Koumadi, K.M.: Detection and prevention of man-in-the-middle spoofing attacks in manets using predictive techniques in artificial neural networks (ANN). J. Comput. Netw. Commun. 2019, 1–14 (2019)CrossRef
42.
Zurück zum Zitat Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRef Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRef
44.
Zurück zum Zitat Harikrishnan, T., Babu, C.: Cryptanalysis of hummingbird algorithm with improved security and throughput. In: 2015 International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI-SATA) (2015) Harikrishnan, T., Babu, C.: Cryptanalysis of hummingbird algorithm with improved security and throughput. In: 2015 International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI-SATA) (2015)
45.
Zurück zum Zitat Engels, D., Fan, X., Gong, G., Hu, Honggang, Smith, E.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. Financ. Cryptogr. Data Secur. 6054, 3–18 (2010)CrossRef Engels, D., Fan, X., Gong, G., Hu, Honggang, Smith, E.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. Financ. Cryptogr. Data Secur. 6054, 3–18 (2010)CrossRef
46.
Zurück zum Zitat Fan, X., Hu, H., Gong, G., Smith, E., Engels, D.: Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1–7 (2009) Fan, X., Hu, H., Gong, G., Smith, E., Engels, D.: Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1–7 (2009)
47.
Zurück zum Zitat Santos, J., Leroux, P., Wauters, T., Volckaert, B., De Turck, F.: Anomaly detection for Smart City applications over 5G low power wide area networks. In: NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018) Santos, J., Leroux, P., Wauters, T., Volckaert, B., De Turck, F.: Anomaly detection for Smart City applications over 5G low power wide area networks. In: NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)
48.
Zurück zum Zitat Chen, L.-J., Ho, Y.-H., Hsieh, H.-H., Huang, S.-T., Lee, H.-C., Mahajan, S.: ADF: an anomaly detection framework for large-scale PM2.5 sensing systems. IEEE Internet Things J. 5(2), 559–570 (2018)CrossRef Chen, L.-J., Ho, Y.-H., Hsieh, H.-H., Huang, S.-T., Lee, H.-C., Mahajan, S.: ADF: an anomaly detection framework for large-scale PM2.5 sensing systems. IEEE Internet Things J. 5(2), 559–570 (2018)CrossRef
Metadaten
Titel
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
verfasst von
Saleh A. Alghamdi
Publikationsdatum
09.09.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 3/2022
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-020-00531-6

Weitere Artikel der Ausgabe 3/2022

International Journal of Information Security 3/2022 Zur Ausgabe