2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2018
DOI: 10.1109/isspit.2018.8705147
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-based recommendation trust model for machine-to-machine communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Hardware/Software-based Attacks Several attacks can take place over the hardware components and software sys- Platoon Attack [37] DDoS Attack [38] DDoS Attack [74] DDoS Attack [77] DDoS Attack [39] GreyHole & BlackHole [40] Black hole [41] Sybil Attack [42] Sybil Attack [43] Sybil Attack [44] Jamming Attack [69] Jamming Attack [45] jamming Attack [91] Data Manipulation [70] Crossfire Attack [56] Spoofing Attack [57] Spoofing Attack [58] Spoofing Attack [92] Cyber Physical Attack [93] Cyber Physical Attack [46] MDS [47] MDS [49] MDS [50] MDS [82] MDS [68] MDS [76] MDS [55] MDS [48] FDI [51] IDS [52] IDS [59] IDS [60] IDS [53] IDS [54] IDS [81] IDS [73] IDS [94] IDS [95] Trust Computation [96] Trust Computation [61] Trust Computation [62] Trust Computation [63] Trust Computation [71] Trust Computation [65] Trust Computation [66] Trust Com...…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hardware/Software-based Attacks Several attacks can take place over the hardware components and software sys- Platoon Attack [37] DDoS Attack [38] DDoS Attack [74] DDoS Attack [77] DDoS Attack [39] GreyHole & BlackHole [40] Black hole [41] Sybil Attack [42] Sybil Attack [43] Sybil Attack [44] Jamming Attack [69] Jamming Attack [45] jamming Attack [91] Data Manipulation [70] Crossfire Attack [56] Spoofing Attack [57] Spoofing Attack [58] Spoofing Attack [92] Cyber Physical Attack [93] Cyber Physical Attack [46] MDS [47] MDS [49] MDS [50] MDS [82] MDS [68] MDS [76] MDS [55] MDS [48] FDI [51] IDS [52] IDS [59] IDS [60] IDS [53] IDS [54] IDS [81] IDS [73] IDS [94] IDS [95] Trust Computation [96] Trust Computation [61] Trust Computation [62] Trust Computation [63] Trust Computation [71] Trust Computation [65] Trust Computation [66] Trust Com...…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
“…Confidentiality [53] Availability [37]- [40], [44], [45], [49]- [55], [59], [60], [69], [70], [74], [77], [81], [84], [94], [98] Integrity [36], [46], [48], [52], [68], [76], [82], [91]- [93] Privacy [42], [51], [54], [64], [72], [75], [78], [80] Authentication [41]- [43], [46], [49], [53], [55]- [60] Trust [61]- [63], [65]- [67], [71], [79], [95], [96] This survey centers around the use of ML in achieving the above security requirements. As shown in Fig.…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to other methods, machine learning approaches provide better results because they can be applied to various types of datasets and can analyze real-time data. In a previous study, a trust model was constructed for machine-to-machine communication using various machine learning approaches, such as logistic regression, NB, DT, KNN and RF [4]. A comparative study has been performed to identify the best approach [5].…”
Section: Literature Surveymentioning
confidence: 99%
“…2, the global cybersecurity market has increased due to increasing threats and attacks, and, by 2023, it is expected that the market will increase exponentially. Despite measures implemented to maintain a secure environment, attacks can occur [4]. Building a network that is immune to all types of attack is not possible.…”
Section: Introductionmentioning
confidence: 99%