2020
DOI: 10.1007/978-3-030-49795-8_68
|View full text |Cite
|
Sign up to set email alerts
|

Survey on the Security Threats in IoT System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…The idea is to estimate the congestion at intermediate nodes and decide if the intermediate node is not forwarding packets at the desired rate because of congestion or because of malicious behavior. The work described in [11] use the mechanism of assigning a value to the "reputation" of a node and using this information to weed out misbehaving nodes and use only trusted and verifiably good nodes. Primarily, the intrusive activity addressed is that of misbehaving nodes that agree to forward packets to neighbors, but fail to do so.…”
Section: B Ids Approaches For Mobile Ad-hoc Net-workmentioning
confidence: 99%
See 2 more Smart Citations
“…The idea is to estimate the congestion at intermediate nodes and decide if the intermediate node is not forwarding packets at the desired rate because of congestion or because of malicious behavior. The work described in [11] use the mechanism of assigning a value to the "reputation" of a node and using this information to weed out misbehaving nodes and use only trusted and verifiably good nodes. Primarily, the intrusive activity addressed is that of misbehaving nodes that agree to forward packets to neighbors, but fail to do so.…”
Section: B Ids Approaches For Mobile Ad-hoc Net-workmentioning
confidence: 99%
“…Long Short-Term Memory (LSTM) and K-Nearest Neighbor (KNN) are used in the attack detection model and performances of those algorithms are compared with each other based on detection time, kappa statistic, geometric mean, and sensitivity. The effectiveness of the developed IDS is evaluated by using Bot-IoT datasets [11]. Indrajit Das (2021) et.al Cyber-attacks have been the major concern with the growing advancement in technology.…”
Section: Specific Objectivesmentioning
confidence: 99%
See 1 more Smart Citation