Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020 7th International Conference on Signal Processing and Integrated Networks (SPIN) 2020
DOI: 10.1109/spin48934.2020.9071118
|View full text |Cite
|
Sign up to set email alerts
|

A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Te anomaly IDS is making use of the location and temporal constraints to identify the malicious devices. Diferent types of attacks are in communication such as DoS attacks [25][26][27], Sybil attacks [28,29], selective forwarding attacks [30][31][32], worm whole attacks [33], black hole attacks [34][35][36], sink hole attacks [37][38][39], jamming attacks, and false data injection attacks [40]. Terefore, many investigators paid their thoughts in the detection of one or more of these attacks by proposing diferent methods for intrusion detection and prevention.…”
Section: Introductionmentioning
confidence: 99%
“…Te anomaly IDS is making use of the location and temporal constraints to identify the malicious devices. Diferent types of attacks are in communication such as DoS attacks [25][26][27], Sybil attacks [28,29], selective forwarding attacks [30][31][32], worm whole attacks [33], black hole attacks [34][35][36], sink hole attacks [37][38][39], jamming attacks, and false data injection attacks [40]. Terefore, many investigators paid their thoughts in the detection of one or more of these attacks by proposing diferent methods for intrusion detection and prevention.…”
Section: Introductionmentioning
confidence: 99%
“…where, 𝑃 𝐴 𝑡 is represent the attack coefficient at iteration t and 𝑃 𝑏 represent the cruise coefficient and 𝑅 ⃗ 1 and 𝑅 ⃗ 2 represent the random vectors between the interval of [0,1]. And‖𝐴 𝑖 ‖ and ‖𝑏 ⃗ 𝑖 ‖ represent Euclidean norm of attack that is defined as (10).…”
Section: First Level Idsmentioning
confidence: 99%
“…Moreover, this process helps to reduce the complexity and also increase the detection rate [9]. IDS has adversarial intrusion; detection of adversarial intrusions is difficult because they look like normal packets [10]. Adversarial learning is used for detecting these types of intrusions which learning adversarial environments and detecting adversarial intrusions in an accurate manner [11].…”
Section: Introductionmentioning
confidence: 99%
“…Also, using MANET in multimedia applications is an interesting [13]. Limited bandwidth, limited range of nodes, random motion of mobile nodes, energy efficient routing and symmetric nodes are the challenges in MANET In the current scenario, mobile ad hoc network are gaining t of their demands in various applications such as the internet of things (IoT) [16]. The sensor nodes are also able to collect and forward information.…”
Section: Routing Protocols In Manetmentioning
confidence: 99%
“…In the current scenario, mobile ad hoc network are gaining popularity due to the advancement of their demands in various applications such as the internet of things (IoT) [16]. The sensor nodes are also able to collect and forward information.…”
Section: Introductionmentioning
confidence: 99%