2020
DOI: 10.1016/j.comcom.2019.12.037
|View full text |Cite
|
Sign up to set email alerts
|

A detection mechanism on malicious nodes in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Also known as "malicious nodes,". It is a harmful attack on IoT's perception layer since its ability to disrupt networks, lose data, and violate privacy [29]. These fake nodes can be used to carry out various types of attacks, such as eavesdropping, data manipulation, or disrupting communication within the network and other nodes [15].…”
Section: Fake Nodesmentioning
confidence: 99%
See 1 more Smart Citation
“…Also known as "malicious nodes,". It is a harmful attack on IoT's perception layer since its ability to disrupt networks, lose data, and violate privacy [29]. These fake nodes can be used to carry out various types of attacks, such as eavesdropping, data manipulation, or disrupting communication within the network and other nodes [15].…”
Section: Fake Nodesmentioning
confidence: 99%
“…Usually, maintaining a whitelist is easier, but large networks are better managed with blacklists. [29] proposes a method to detect malicious nodes in IoT networks using an online learning algorithm. The method involves calculating the credibility of each path on the network, modeling the reputation of the path, and detecting malicious nodes using a clustering algorithm.…”
Section: • Countermeasuresmentioning
confidence: 99%
“…Li et al 63 introduced a novel method based on an online learning (OL) algorithm to detect malicious nodes. In this research study, the OL algorithm was used to discover each node's trust and then trained the model with the K‐means algorithm to classify nodes into malicious and benign nodes.…”
Section: Organization Of Iot Threat Detection Techniquesmentioning
confidence: 99%
“…Reference [ 46 ] proposes a malicious node detection method based on online learning algorithm. This method first calculates the credibility of each path in the network according to the collected data packets, then models the path reputation obtained through online learning algorithm, and calculates the trust of each node, and detects malicious nodes through the clustering algorithm.…”
Section: Common Applications Of Trustmentioning
confidence: 99%