2013
DOI: 10.1007/978-94-007-7262-5_137
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 63 publications
(35 citation statements)
references
References 8 publications
0
35
0
Order By: Relevance
“…[20] Man-in-the-middle Anomaly-based Simulation Centralized [21] Multiple Conventional attacks Signature-based ------ [22] Routing attack Specification-based Simulation Hybrid [23] DoS Specification-based Simulation -- [24] DoS Signature-based Empirical Centralized [25] Routing attack Anomaly-based Simulation Centralized [26] Routing attack Hybrid Simulation Hybrid [27] Multiple Conventional attacks Anomaly-based ---- [28] Multiple Conventional attacks Signature-based Hypothetical Centralized [29] Multiple Conventional attacks Specification-based Empirical Hybrid [30] Multiple Conventional attacks Signature-based Empirical Distributed [31] DoS Anomaly-based Simulation Distributed [32] Routing attack and MITM Hybrid Simulation [33] Routing attack Hybrid Simulation Distributed [34] Conventional Anomaly-based Empirical [35] Multiple Conventional attacks Anomaly-based ----Hybrid [36] Routing attack Anomaly-based Simulation Hybrid…”
Section: References Security Threat Detection Methods Validation Stratmentioning
confidence: 99%
“…[20] Man-in-the-middle Anomaly-based Simulation Centralized [21] Multiple Conventional attacks Signature-based ------ [22] Routing attack Specification-based Simulation Hybrid [23] DoS Specification-based Simulation -- [24] DoS Signature-based Empirical Centralized [25] Routing attack Anomaly-based Simulation Centralized [26] Routing attack Hybrid Simulation Hybrid [27] Multiple Conventional attacks Anomaly-based ---- [28] Multiple Conventional attacks Signature-based Hypothetical Centralized [29] Multiple Conventional attacks Specification-based Empirical Hybrid [30] Multiple Conventional attacks Signature-based Empirical Distributed [31] DoS Anomaly-based Simulation Distributed [32] Routing attack and MITM Hybrid Simulation [33] Routing attack Hybrid Simulation Distributed [34] Conventional Anomaly-based Empirical [35] Multiple Conventional attacks Anomaly-based ----Hybrid [36] Routing attack Anomaly-based Simulation Hybrid…”
Section: References Security Threat Detection Methods Validation Stratmentioning
confidence: 99%
“…Lee et al [12] OF and MRHOF are not discussed within discussion of detecting malicious activity based on power consumption and network flow. MRHOF and OF0 for each IoT combination attack along with power consumption, hop count, and dropped packet metrics will be in the scope of our work.…”
Section: Mrhof and Of0 Attacksmentioning
confidence: 99%
“…Lee et. al [29] proposed a computationally lighter IDS for IoT systems. This technique utilizes a distributed placement strategy for monitoring the node energy consumed for intrusion detection, namely DoS attacks.…”
Section: Prevention Of Intrusion Detection-an Internet Of Things mentioning
confidence: 99%