2021
DOI: 10.1088/1742-6596/1850/1/012031
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Based Security Model to Detect Misbehaving Nodes in Internet of Things (IoT) Environment using Logistic Regression

Abstract: Ensuring authentication in the Internet of Things (IoT) environment is a crucial task because of its unique characteristics which include sensing, intelligence, large scale, selfconfiguring, connectivity, heterogeneity, open and dynamic environment. Besides, every object in the IoT environment should trust other devices with no recommendation or prior knowledge for any network operations. Hence, those characteristics and blindness in communication make security violations in the form of various attacks. Theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Logistic Regression (LoR): A study in [113] investigated a trust model based on LoR that provides an accurate method in routing protocol for lossy network to classify the non-trustworthy nodes. The proposed model employed the LoR technique to identify the behavior of the nodes based on the combined trust values.…”
Section: Direct Trust Evaluation Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Logistic Regression (LoR): A study in [113] investigated a trust model based on LoR that provides an accurate method in routing protocol for lossy network to classify the non-trustworthy nodes. The proposed model employed the LoR technique to identify the behavior of the nodes based on the combined trust values.…”
Section: Direct Trust Evaluation Modelsmentioning
confidence: 99%
“…However, it is ineffective for low-dimension data. Janani et al [113] developed an RF-based model that provided security to the IoT network and enhanced the trusted routing of the IoT scenario by identifying the sinkhole attack. The developed model was limited to a single attack and did not mention other privacy issues or attacks on IoT devices.…”
Section: Direct Trust Evaluation Modelsmentioning
confidence: 99%
“…On the contrary, video capture is implemented to record the current gas concentration. After giving an alarm, the current gas concentration data is stored and analyzed [36].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…(21) reviewed different strategies for intrusion detection systems in IoT and addressed the classification of attacks in IoT. In (22) proposed a model to identify misbehaving nodes in RPL black hole attacks to ensure authentication. In (23) provides all the information about RPL with formulas and https://www.indjst.org/ definitions.…”
Section: Introductionmentioning
confidence: 99%