2023
DOI: 10.11591/ijeecs.v29.i3.pp1567-1576
|View full text |Cite
|
Sign up to set email alerts
|

Reputation-based Security model for detecting biased attacks in BigData

Abstract: As internet of things (IoT) devices are increasing since the emergence of these devices in 2010, the data stored by these devices should have a proper security measure so that it can be stored without getting in hands of an attacker. The data stored has to be analyzed whether the data is safe or malicious, as the malicious data can corrupt the whole information. The security model in BigData has many challenges such as vulnerability to fake data generation, troubles with cryptographic protection, and absent se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 25 publications
(46 reference statements)
0
2
0
Order By: Relevance
“…Further, the base station maintains a buffer to keep the past and present reputation value of all the IoT devices. In similar manner to [25], the work uses a local i.e., direct association reputation and global i.e., indirect association reputation and compare the local and global reputation to assure accuracy and reliability by eliminating IoT device that provide wrong reputation for personal workflow execution benefit. In this work malicious activities are introduced into the network by creating attacks like DDOS and on-off attacks using NSL-KDD dataset [30] on certain IoT device in random manner.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, the base station maintains a buffer to keep the past and present reputation value of all the IoT devices. In similar manner to [25], the work uses a local i.e., direct association reputation and global i.e., indirect association reputation and compare the local and global reputation to assure accuracy and reliability by eliminating IoT device that provide wrong reputation for personal workflow execution benefit. In this work malicious activities are introduced into the network by creating attacks like DDOS and on-off attacks using NSL-KDD dataset [30] on certain IoT device in random manner.…”
Section: Resultsmentioning
confidence: 99%
“…Where, ℂ o u (x, y) is the present reputation, 𝕃 o u (x, y) is the past reputation of the IoT nodes and α is used for denoting how the reputation for a IoT node can be attained using the past reputation. The ℂ o u (x, y), 𝕃 o u (x, y) and α have been evaluated using [25].…”
Section: Dynamic Access-control In Iot Environment Using Reputation-b...mentioning
confidence: 99%