The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1109/access.2019.2917135
|View full text |Cite
|
Sign up to set email alerts
|

BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(64 citation statements)
references
References 35 publications
0
64
0
Order By: Relevance
“…Meanwhile, in the specification-based method, malicious behavior is detected through the behavior deviation of system from the expertdefined rules [23]. You et al [10] and Sharma et al [11] applied behavior-rules specification-based approach for misbehavior detection in healthcare IoT and UAV-IoT, respectively. The authors derived the behavior-rules from a given operation profile.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Meanwhile, in the specification-based method, malicious behavior is detected through the behavior deviation of system from the expertdefined rules [23]. You et al [10] and Sharma et al [11] applied behavior-rules specification-based approach for misbehavior detection in healthcare IoT and UAV-IoT, respectively. The authors derived the behavior-rules from a given operation profile.…”
Section: Related Workmentioning
confidence: 99%
“…This section presents the derivation of the behavior-rule of the sample smart greenhouse environment. The steps adopted in the derivation of behavior-rules are inspired by [11].…”
Section: Behavior-rule Specification Of Smart Greenhouse Farmmentioning
confidence: 99%
See 1 more Smart Citation
“…Das et al [26] used EllipticCurve Cryptography and key-agreement techniques to design a lightweight security mechanism for the IoT system. Sharma et al [27] utilize the approach of behavior rule specification to design a misbehavior recognition scheme for a cyber-based IoT ecosystem. Dynamic characteristics obtained from creeping wave propagation is utilized in the study Wang et al [28] to provide safeguard to on-body IoT devices.…”
Section: A the Backgroundmentioning
confidence: 99%
“…IDS detects whether there is an attack behavior in the network and immediately performs response processing. Recently, a large number of techniques are applied to intrusion detection, such as rule-based network intrusion detection technology [8], artificial immune system [9], clustering-based technology [10,11], Support Vector Machine (SVM) [12,13], neural network [14][15][16], etc. Currently, among many intrusion detection algorithms, neural network-related algorithms have been widely used because of their good robustness and adaptability.…”
Section: Introductionmentioning
confidence: 99%