2019
DOI: 10.1186/s13174-019-0117-8
|View full text |Cite
|
Sign up to set email alerts
|

Clustering and reliability-driven mitigation of routing attacks in massive IoT systems

Abstract: As an integral component of the 5G communications, the massive Internet of Things (IoT) are vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing resources, and heterogeneity of mobile objects. The sinkhole and selective forwarding attacks stand out among the most destructive ones for infrastructureless networks. Despite the countermeasures introduced by legacy intrusion detection systems (IDS), the massive IoT seeks novel solutions to address their unique requirements. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 19 publications
(51 reference statements)
0
14
0
Order By: Relevance
“…57 In this way, as shows Figure 8, we establish a triangle of opinions 58 with the variables belief (b), unbelief (d), and uncertainty (u). We obtain the values of , , by Equations (8)(9)(10), where + + = 1, and { , , } ∈ [0, 1] 3 . 56 The opinion at the SL computes positive and negative experiences about a given device.…”
Section: Authentication Management Modulementioning
confidence: 99%
See 1 more Smart Citation
“…57 In this way, as shows Figure 8, we establish a triangle of opinions 58 with the variables belief (b), unbelief (d), and uncertainty (u). We obtain the values of , , by Equations (8)(9)(10), where + + = 1, and { , , } ∈ [0, 1] 3 . 56 The opinion at the SL computes positive and negative experiences about a given device.…”
Section: Authentication Management Modulementioning
confidence: 99%
“…7,8 However, a couple of issues inherent to IoT (e.g., heterogeneity, mobility, computing resource, and power) often inhibit the use of such services. 9 At the system-level, the maintenance of system operation availability relies on security methods 10 to analyze physical behavior and support the decision-making, 11 as the threat of attacks is always a possibility, demanding measures to detect them and mitigate their effects. 12,13 .…”
Section: Introductionmentioning
confidence: 99%
“…If it notices inconsistencies in a data packet, it checks the route of the nodes against the memory route and keeps similar nodes in memory and deletes the malicious node, then notifies other nodes not to forward their observed data to the detected malicious node anymore. In the recent years (2018 and 2019), the research interest in routing related attacks has been increasing [24]. For example, Internet of things as an integral component of the 5th generation (5G) communications is vulnerable to routing attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using object groupings contributes to network organization, decreased resource consumption, and the quality with which information is disseminated [9]. Thus, the task allocation problem is not trivial [10] due to the size and configurations that an IIoT network can achieve [11].…”
Section: Introductionmentioning
confidence: 99%