2019
DOI: 10.1109/jiot.2019.2904302
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Online Quantitative Security Analysis in 6LoWPAN Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Saleem et al [22] have used a bio-inspired approach towards securing IoT communication over 5G. Ramos et al [23] have carried out an investigation toward analyzing security aspects of resourceconstrained IoT devices using probabilistic model. Liu et al [24] have implemented a scheme towards resisting sink hole attack in IoT using probing routes considering consumption of network energy.…”
Section: Related Workmentioning
confidence: 99%
“…Saleem et al [22] have used a bio-inspired approach towards securing IoT communication over 5G. Ramos et al [23] have carried out an investigation toward analyzing security aspects of resourceconstrained IoT devices using probabilistic model. Liu et al [24] have implemented a scheme towards resisting sink hole attack in IoT using probing routes considering consumption of network energy.…”
Section: Related Workmentioning
confidence: 99%
“…As a consequence of the evolving and emerging cyber security threats, researchers have been developing various works that propose approaches to cyber security analysis. Security metrics, for instance, have been proposed in [Ramos et al 2019] to the construction and maintenance of more secure systems. To address these issues, this work proposes three security metrics: trust probability, damage level and data security level.…”
Section: Related Workmentioning
confidence: 99%
“…Nonetheless, most of the available IDS solutions can detect attacks, but cannot quantify the attack severity [113]. Ramos et al proposed the Node Security Quantification (NSQ) probabilistic model to quantitatively evaluate the severity of an attack on affected networks.…”
Section: Ids For 6lowpan-based Networkmentioning
confidence: 99%
“…Finally, in addition to protecting the integrity of the network, protecting the integrity of the information carried by the system [113] in spite of successful intrusions should also be explored as an objective of future IDS.…”
Section: Relevant Approaches For Ble Mesh Idsmentioning
confidence: 99%