2021
DOI: 10.48550/arxiv.2106.15890
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

Abstract: The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousand IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing, and sharing information. No… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 49 publications
0
3
0
Order By: Relevance
“…This section provides an overview of our existing proposed clone node attack detection scheme [16], including the background description, methodology with the network components and proposed algorithms, to assist readers in understanding the proposed scheme's procedure and helping with the system modelling, analysis and verification processes.…”
Section: An Overview Of Our Existing Proposed Clone Node Attack Detec...mentioning
confidence: 99%
See 2 more Smart Citations
“…This section provides an overview of our existing proposed clone node attack detection scheme [16], including the background description, methodology with the network components and proposed algorithms, to assist readers in understanding the proposed scheme's procedure and helping with the system modelling, analysis and verification processes.…”
Section: An Overview Of Our Existing Proposed Clone Node Attack Detec...mentioning
confidence: 99%
“…Some other methods for finding the cloned node attacks include finding network witnesses [6], measuring the signal strength of devices [9], randomly picking secret keys [10], calculating trust values [11,12], managing distributed trust [13], localization algorithms [14] and multi-dimensional scaling [15]. A detailed analysis of existing schemes based on wireless sensor networks, IoT, and mobile ad-hoc networks for detecting clone node attacks is summarised here [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation