2017
DOI: 10.1109/tvt.2017.2701551
|View full text |Cite
|
Sign up to set email alerts
|

An Accurate Security Game for Low-Resource IoT Devices

Abstract: International audienceThe Internet of Things (IoT) technology incorporates a large number of heterogeneous devices connected to untrusted networks. Nevertheless, securing IoT devices is a fundamental issue due to the relevant information handled in IoT networks. The intrusion detection system (IDS) is the most commonly used technique to detect intruders and acts as a second wall of defense when cryptography is broken. This is achieved by combining the advantages of anomaly and signature detection techniques, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
3

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(37 citation statements)
references
References 28 publications
0
34
0
3
Order By: Relevance
“…The second approach is where the sensor nodes detect intrusions alongside their normal operations. This approach involves the process of continuous self and neighbor inspection, and is discussed in [72], [84], [93], [127], [131], [137], [145]- [147]. In [135], the network is composed of an hierarchical structure, where the nodes are classified as free, leader, and member or associated nodes.…”
Section: ) On the Basis Of Placement Methodologymentioning
confidence: 99%
“…The second approach is where the sensor nodes detect intrusions alongside their normal operations. This approach involves the process of continuous self and neighbor inspection, and is discussed in [72], [84], [93], [127], [131], [137], [145]- [147]. In [135], the network is composed of an hierarchical structure, where the nodes are classified as free, leader, and member or associated nodes.…”
Section: ) On the Basis Of Placement Methodologymentioning
confidence: 99%
“…A number of trust based systems have also been proposed that compute the reputation of devices by considering the social connectivity network of devices and similarity measure between device feedback [46,47,48]. In [49], authors proposed a game theory based technique to perform the anomaly detection in the IoT network by matching the attack signature. The authors further developed the reputation model based on the game theory to minimize the false positive rate incurred because of signature matching.…”
Section: Intrusion Detection Within Iot Systemsmentioning
confidence: 99%
“…Existe uma vasta literatura sobre mecanismos de detecção de DDoS [McDermott et al 2018, Kuhnert et al 2018, Dash and Craven 2017, De Carli et al 2017, considerando pontos de detecção no núcleo da rede [Silveira et al 2011, Liaskos et al 2016, Mazel et al 2015, Nevat et al 2018, Pena et al 2017, nos hosts de rede [Sedjelmaci et al 2017, Summerville et al 2015] e na borda [Doshi et al 2018, Meidan et al 2018, Ozcelik et al 2017.…”
Section: Trabalhos Relacionadosunclassified
“…Em [Sedjelmaci et al 2017, Summerville et al 2015, os autores propõem soluções para detectar ataques nos hosts da rede. Embora tais métodos sejam eficazes para localizar e isolar botnets, sua execução pode não ser viável em dispositivos de IoT.…”
Section: Trabalhos Relacionadosunclassified