2022
DOI: 10.3390/s22124539
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security

Abstract: Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of new cutting-edge applications. Despite the prospective benefits and many security solutions offered in the literature, the security of IoT networks remains a critical concern, considering the massive amount of data generated and transmitted. The resource-constrained, mobile, and heterogeneous nature of the IoT makes it increasingly challenging to preser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 51 publications
0
4
0
Order By: Relevance
“…• Data integrity and prevention of tampering: Ensuring the integrity of IoT data is crucial to maintaining its accuracy and trustworthiness. Implementing techniques such as digital signatures [48] or hash functions [49] helps verify the integrity of IoT data and detect any unauthorized modifications. Digital signatures provide a way to validate the authenticity and integrity of data by using cryptographic techniques to bind the data to the identity of the sender, ensuring that it has not been tampered with during transmission or storage.…”
Section: B Network Security Challengesmentioning
confidence: 99%
“…• Data integrity and prevention of tampering: Ensuring the integrity of IoT data is crucial to maintaining its accuracy and trustworthiness. Implementing techniques such as digital signatures [48] or hash functions [49] helps verify the integrity of IoT data and detect any unauthorized modifications. Digital signatures provide a way to validate the authenticity and integrity of data by using cryptographic techniques to bind the data to the identity of the sender, ensuring that it has not been tampered with during transmission or storage.…”
Section: B Network Security Challengesmentioning
confidence: 99%
“…Moreover, the paper does not provide a thorough evaluation of the scalability of the proposed protocol, which is a critical consideration for IoT networks that involve a large number of devices. Farooq et al [21] presented a multi-agent system based trust mechanism. It employs a multi-agent system that monitors node behaviour and allocates trust values based on their actions.…”
Section: Related Workmentioning
confidence: 99%
“…Farooq et al [4] proposed a multi-agent trust approach to mitigate Sybil attacks in wireless sensor networks. The suggested method uses multiple agents to fetch trust-related data and ship it to the fog layer for analysis.…”
Section: Related Workmentioning
confidence: 99%
“…For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ capabilities) and are categorized by low information, high error rates, and volatility in correspondence joins [4]. Power consumption information is gathered from consumers using massive smart meters in an Advanced Metering Infrastructure (AMI).…”
Section: Introductionmentioning
confidence: 99%