2021
DOI: 10.11591/ijece.v11i2.pp1761-1770
|View full text |Cite
|
Sign up to set email alerts
|

DEDA: An algorithm for early detection of topology attacks in the internet of things

Abstract: The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Similarly, in smart universities, real-time anomaly detection will secure student and administrative data and campus facilities against unauthorized access and cyber breaches [32]. By exploring scalability and resilience, future research will contribute to robust cybersecurity frameworks tailored to IIoT environments, effectively addressing emerging challenges posed by cyber threats and attacks [33], [34].…”
Section: Experiments Resultsmentioning
confidence: 99%
“…Similarly, in smart universities, real-time anomaly detection will secure student and administrative data and campus facilities against unauthorized access and cyber breaches [32]. By exploring scalability and resilience, future research will contribute to robust cybersecurity frameworks tailored to IIoT environments, effectively addressing emerging challenges posed by cyber threats and attacks [33], [34].…”
Section: Experiments Resultsmentioning
confidence: 99%
“…Secondly, personal information and sensitive patient data could be altered, used, or compromised without real-time control. This poses a risk to the infrastructure and a disastrous effect on people's lives, as the transmission of false data can lead to misdiagnosis and severe health problems and even put patients' lives at Bulletin of Electr Eng & Inf ISSN: 2302-9285  risk [7], [8]. If these data can be verified (data authentication), this prevents users from accessing erroneous or falsified data.…”
Section: Introductionmentioning
confidence: 99%
“…However, RPL-based networks are vulnerable to a massive security vulnerabilities due to their limited nature [11], [12]. The most dangerous attack in IoT implementation is the blackhole attack, which is regarded as one of the most dangerous and a point of entry for all other attacks [13].…”
Section: Introductionmentioning
confidence: 99%