2023
DOI: 10.22247/ijcna/2023/218514
|View full text |Cite
|
Sign up to set email alerts
|

Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Enhanced trust and confidence in IoBT industry products and services is another anticipated outcome of integrating the zero trust Model into IoBT systems. As the Internet of Battlefield Things continues to evolve, delivering intelligence services on the battlefield to commanders and soldiers, it is crucial that users have faith in the reliability and security of these advanced technologies [104]. By adhering to the principle of zero trust, which states that no entity-user, app, service, or device-should be trusted by default, the IoBT industry can build and maintain trust among its stakeholders.This covers the integration of multi-tier security mechanisms beyond traditional perimeter-oriented methods and Cisco's zero trust platform, which is renowned for securing hybrid work environments, easing compliance, and minimizing ransomware danger.…”
Section: Future Directionmentioning
confidence: 99%
“…Enhanced trust and confidence in IoBT industry products and services is another anticipated outcome of integrating the zero trust Model into IoBT systems. As the Internet of Battlefield Things continues to evolve, delivering intelligence services on the battlefield to commanders and soldiers, it is crucial that users have faith in the reliability and security of these advanced technologies [104]. By adhering to the principle of zero trust, which states that no entity-user, app, service, or device-should be trusted by default, the IoBT industry can build and maintain trust among its stakeholders.This covers the integration of multi-tier security mechanisms beyond traditional perimeter-oriented methods and Cisco's zero trust platform, which is renowned for securing hybrid work environments, easing compliance, and minimizing ransomware danger.…”
Section: Future Directionmentioning
confidence: 99%