2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00219
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of Routing Attacks in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Relied on the estimation of mutual information gain, a significant performance was achieved. Key-based and clustering-based algorithms were introduced to recognize the routing attacks under IoT networks [17]. The deployment of a cluster based approach [18] has significantly improved the detection performance on similar attacks.…”
Section: Machine Learning Oriented Idfsmentioning
confidence: 99%
“…Relied on the estimation of mutual information gain, a significant performance was achieved. Key-based and clustering-based algorithms were introduced to recognize the routing attacks under IoT networks [17]. The deployment of a cluster based approach [18] has significantly improved the detection performance on similar attacks.…”
Section: Machine Learning Oriented Idfsmentioning
confidence: 99%
“…In a replay attack, a malicious node sends a signed packet to the destination numerous times to keep the network busy [17]. Routing information attacks, in which an attacker creates a route or continues to transmit error messages by altering the routing information [18], Table 1 summarize part of physical and network attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Various approaches were developed earlier to ensure a secured communication between nodes of IoT. In the starting of research over security in IoT, the authors focused on cryptography based algorithms such as key matching and hashing [6]. However, the main problem was a huge computational complexity due to a number of mathematic computations.…”
Section: Literature Surveymentioning
confidence: 99%