{"id":"https://openalex.org/W4416323583","doi":"https://doi.org/10.1109/tii.2025.3624103","title":"A Reverse Auction-Driven Fog Resource Allocation Strategy for DDoS Mitigation in Smart Grids","display_name":"A Reverse Auction-Driven Fog Resource Allocation Strategy for DDoS Mitigation in Smart Grids","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W4416323583","doi":"https://doi.org/10.1109/tii.2025.3624103"},"language":null,"primary_location":{"id":"doi:10.1109/tii.2025.3624103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3624103","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101614298","display_name":"Jun Chen","orcid":"https://orcid.org/0009-0005-0657-4173"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Chen","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038550059","display_name":"Xin Sun","orcid":"https://orcid.org/0000-0002-3351-7079"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Sun","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038007472","display_name":"Wen Tian","orcid":"https://orcid.org/0000-0003-1648-3863"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Tian","raw_affiliation_strings":["Key Laboratory of Intelligent Support Technology In Complex Environment, Nanjing University of Information Science and Technology, Ministry of Education, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Support Technology In Complex Environment, Nanjing University of Information Science and Technology, Ministry of Education, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046312961","display_name":"Miao Du","orcid":"https://orcid.org/0000-0002-7303-8726"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miao Du","raw_affiliation_strings":["School of Computer Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068227459","display_name":"Xiaoming He","orcid":"https://orcid.org/0000-0003-4196-3041"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoming He","raw_affiliation_strings":["College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062243742","display_name":"Guangjie Liu","orcid":"https://orcid.org/0000-0003-4729-7406"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangjie Liu","raw_affiliation_strings":["Key Laboratory of Intelligent Support Technology In Complex Environment, Nanjing University of Information Science and Technology, Ministry of Education, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Support Technology In Complex Environment, Nanjing University of Information Science and Technology, Ministry of Education, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101614298"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45843088,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"2","first_page":"1153","last_page":"1161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0010000000474974513,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7972999811172485},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5712000131607056},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5575000047683716},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.5087000131607056},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4271000027656555},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4198000133037567},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.41350001096725464},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3853999972343445},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.376800000667572}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7972999811172485},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789000272750854},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5945000052452087},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5712000131607056},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5575000047683716},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.5087000131607056},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4271000027656555},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4198000133037567},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41589999198913574},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.41350001096725464},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3853999972343445},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.376800000667572},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.37310001254081726},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.3467999994754791},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.33820000290870667},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.3046000003814697},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.29109999537467957},{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C194291561","wikidata":"https://www.wikidata.org/wiki/Q2852717","display_name":"Reverse auction","level":3,"score":0.27250000834465027},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C148764684","wikidata":"https://www.wikidata.org/wiki/Q621751","display_name":"Approximation algorithm","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26600000262260437},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2025.3624103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3624103","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2053981365","https://openalex.org/W2342831316","https://openalex.org/W2553159728","https://openalex.org/W2740388988","https://openalex.org/W2784055419","https://openalex.org/W2789266794","https://openalex.org/W2799944166","https://openalex.org/W2901174000","https://openalex.org/W2960426479","https://openalex.org/W2963209633","https://openalex.org/W2964129362","https://openalex.org/W2990661589","https://openalex.org/W2998944365","https://openalex.org/W3015716146","https://openalex.org/W3042149168","https://openalex.org/W3046523310","https://openalex.org/W3087958975","https://openalex.org/W3120598853","https://openalex.org/W3131820504","https://openalex.org/W3156226702","https://openalex.org/W3169649651","https://openalex.org/W4210655093","https://openalex.org/W4312058488","https://openalex.org/W4317794926","https://openalex.org/W4360604869","https://openalex.org/W4378620147","https://openalex.org/W4392909588","https://openalex.org/W4394692435","https://openalex.org/W4396817527","https://openalex.org/W4404035300","https://openalex.org/W4404281730"],"related_works":[],"abstract_inverted_index":{"Advanced":[0],"metering":[1],"infrastructure":[2],"in":[3,114],"smart":[4,115],"grids":[5],"faces":[6],"critical":[7],"security":[8,110],"challenges":[9],"from":[10,22,84],"distributed":[11,51],"denial":[12],"of":[13,111],"service":[14],"(DDoS)":[15],"attacks,":[16],"while":[17,89],"traditional":[18],"traceback":[19],"methods":[20],"suffer":[21],"resource":[23,39],"constraints":[24],"that":[25,42,80,96],"limit":[26],"their":[27],"mitigation":[28],"effectiveness.":[29],"To":[30],"address":[31],"this,":[32],"we":[33,72],"propose":[34],"a":[35,45,65,74],"reverse":[36,46],"auction-driven":[37],"fog":[38,52],"allocation":[40,91],"strategy":[41],"innovatively":[43],"employs":[44],"auction":[47,77],"mechanism":[48],"to":[49,86],"coordinate":[50],"resources":[53],"for":[54,70],"collaborative":[55],"DDoS":[56,112],"attack":[57],"mitigation.":[58],"Specifically,":[59],"the":[60,97,107],"framework":[61],"is":[62],"formulated":[63],"as":[64],"0\u20131":[66],"integer":[67],"programming":[68],"model,":[69],"which":[71],"develop":[73],"second-price":[75],"sealed-bid":[76],"(SPSA)":[78],"algorithm":[79,99],"reduces":[81],"computational":[82],"complexity":[83],"factorial":[85],"polynomial":[87],"time":[88],"maintaining":[90],"optimality.":[92],"Experimental":[93],"results":[94],"demonstrate":[95],"SPSA":[98],"outperforms":[100],"existing":[101],"baseline":[102],"methods,":[103],"significantly":[104],"improving":[105],"both":[106],"efficiency":[108],"and":[109],"defenses":[113],"grid":[116],"environments.":[117]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-18T00:00:00"}
