2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) 2018
DOI: 10.1109/iccubea.2018.8697406
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Assessment of Security Attack Detection Algorithms in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 61 publications
0
5
0
Order By: Relevance
“…The drawback present in the system is the lack of process validation [24]. If the system is unaware of existing attack probes, the prolonged destruction of attacks corrupts the internal operations and provides a resilient change in the floor [25][26][27]. Bhatti et al discussed various watermarking techniques in image processing, in which a novel structure using Quaternion Fourier Transform (QFT) is being implemented.…”
Section: Related Workmentioning
confidence: 99%
“…The drawback present in the system is the lack of process validation [24]. If the system is unaware of existing attack probes, the prolonged destruction of attacks corrupts the internal operations and provides a resilient change in the floor [25][26][27]. Bhatti et al discussed various watermarking techniques in image processing, in which a novel structure using Quaternion Fourier Transform (QFT) is being implemented.…”
Section: Related Workmentioning
confidence: 99%
“…J.B. Karande and S.A. Joshi [60] conducted their study to evaluate the effectiveness of numbers of attacks detection algorithms used in the IoT and found that these algorithms were effective in the case of independent attacks. Yet, when many attacks occur and cooperate on IoT networks, these algorithms would be less effective in protecting the IoT networks.…”
Section: Ids-based Security Solution In Iotmentioning
confidence: 99%
“…Security attack detection mechanisms and their effectiveness are evaluated in various scenarios like a single attacker, multiple attackers and collaborative attackers in [4]. The attacks on the IoT devices are broadly classified according to target vulnerabilities in a) Device-based b) Network-based and c) Software-based.…”
Section: Literature Reviewmentioning
confidence: 99%