2021
DOI: 10.1109/jiot.2020.3047642
|View full text |Cite
|
Sign up to set email alerts
|

A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…DS evidence rules fuse the training subclassifiers to obtain the overall trust classifier. Liu et al [19] proposed an effective detection mechanism for conditional packet manipulation attacks in IoT networks. To evaluate the trust value of each IoT device, a regression model is first trained based on the reputation of relevant routing paths.…”
Section: Related Workmentioning
confidence: 99%
“…DS evidence rules fuse the training subclassifiers to obtain the overall trust classifier. Liu et al [19] proposed an effective detection mechanism for conditional packet manipulation attacks in IoT networks. To evaluate the trust value of each IoT device, a regression model is first trained based on the reputation of relevant routing paths.…”
Section: Related Workmentioning
confidence: 99%
“…K-Means Algorithm: In [120], the authors presented conditional packet manipulation attacks called targeted insider attacks. The proposed scheme maintains limited performance metrics of trust for each node, which show the possibility of initial attacks such as forwarding the packets with specific values.…”
Section: Techniques For Evaluation Of Assisting Trustmentioning
confidence: 99%
“…In their work, node misbehaving is detected via k-means clustering. Targeting packet manipulation attacks, Liu et al [91] tackled a regression-based approach together with a clustering algorithm to classify nodes as benign or malicious. Yang et al [92] investigated the problem of outlier detection in WSNs with a fuzzy-based trust evaluation methodology, to achieve a balance between energy consumption and security in the CH election process.…”
Section: B Clustering Modelsmentioning
confidence: 99%