2020
DOI: 10.1002/ett.3873
|View full text |Cite
|
Sign up to set email alerts
|

Recognition of grey hole attacks in wireless sensor networks using fuzzy logic in IoT

Abstract: Since the devices in Internet of Things (IoT) are always interconnected with a stable Internet connection, they are prone to attacks. In the grey hole attack, a malicious node acts as a central controller to obtain data from all the nodes and it drops and alters the data packets as per its wish. In this way, the grey hole attack alters the core concept of the IoT, which enables different devices to communicate with each other. To prevent the grey hole attack and enable efficient communication between the IoT d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In both approaches, 16,24 Normal packet loss due to noise or congestion has not been considered so false positive rate increases and attack detection accuracy decreases. Ye et al 25 proposed fuzzy logic-based gray hole attack detection in IoT. They proposed fuzzy engine to identify the suspicious activity in the network by the rules generated.…”
Section: Related Workmentioning
confidence: 99%
“…In both approaches, 16,24 Normal packet loss due to noise or congestion has not been considered so false positive rate increases and attack detection accuracy decreases. Ye et al 25 proposed fuzzy logic-based gray hole attack detection in IoT. They proposed fuzzy engine to identify the suspicious activity in the network by the rules generated.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed fuzzy path selection approach is simulated and evaluated to efficiently decrease the effects of selective forwarding attacks and increases routing reliability. [42] proposed a fuzzy engine to identify the selective forwarding attack and stop its function immediately.…”
Section: Ai-based Schemesmentioning
confidence: 99%
“…But the transient fluctuation of channels may result in the rapid change of the threshold values, and then draw mistake detection results. The AI-based detection schemes [34][35][36][37][38][39][40][41][42][43][44][45] find malicious nodes by actively learning their malicious behaviors which are different from those of normal nodes. But these schemes need a long learning process or game process to model the malicious behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…The data exploration is sophisticated and ineffective in smart energy networks. 7 In the uncertain complexion, it is hard to implement complex evaluation to their inconstant information. 8 Generally, in complicated power models, data are primarily forwarded in the type of time sequence, which captivates for their major progress, high discretion, and its predicament to manifest models.…”
Section: Introductionmentioning
confidence: 99%
“…The data exploration is sophisticated and ineffective in smart energy networks 7 . In the uncertain complexion, it is hard to implement complex evaluation to their inconstant information 8 .…”
Section: Introductionmentioning
confidence: 99%