2021
DOI: 10.1007/s11277-021-08388-1
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema

Abstract: The Internet of Things, also known as the IoT, refers to the billions of devices around the world that are now connected to the Internet, collecting and sharing data. The amount of data collected through IoT sensors must be completely securely controlled. To protect the information collected by IoT sensors, a lightweight method called Discover the Flooding Attack-RPL (DFA-RPL) has been proposed. The proposed DFA-RPL method identifies intrusive nodes in several steps to exclude them from continuing routing oper… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Also the model is tested on real testbed with a smaller size of IoT network. Also, Fotohi et al 23 proposes a lightweight clustering mechanism for detecting flooding attacks in IoT environment using ant colony optimization algorithm. The model efficacy has been tested using the NS‐3 network simulator.…”
Section: Related Workmentioning
confidence: 99%
“…Also the model is tested on real testbed with a smaller size of IoT network. Also, Fotohi et al 23 proposes a lightweight clustering mechanism for detecting flooding attacks in IoT environment using ant colony optimization algorithm. The model efficacy has been tested using the NS‐3 network simulator.…”
Section: Related Workmentioning
confidence: 99%
“…𝜂: In mobile ad-hoc networks, the end-to-end delay criterion refers to the time it takes for data packets along the entire network to reach the destination node from the source node. [31][32][33][34] Delay is calculated as Equation ( 7):…”
Section: Performance Metricsmentioning
confidence: 99%
“…In Botnets, high‐capacity resources have command and control (C&C), which issues instructions per the attacker's guidelines. The dangerous flooding attacks fall into the category of DDoS attacks 6 . In order to ensure security, intrusion detection systems (IDSs), especially network IDSs (NIDSs) are currently one of the most prominent solutions 7 .…”
Section: Introductionmentioning
confidence: 99%
“…The dangerous flooding attacks fall into the category of DDoS attacks. 6 In order to ensure security, intrusion detection systems (IDSs), especially network IDSs (NIDSs) are currently one of the most prominent solutions. 7 DDoS attack architecture is shown in Figure 1.…”
mentioning
confidence: 99%