2020 6th International Conference on Web Research (ICWR) 2020
DOI: 10.1109/icwr49608.2020.9122278
|View full text |Cite
|
Sign up to set email alerts
|

A New Method for Intrusion Detection on RPL Routing Protocol Using Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…In such instances, a local repair attack may be carried out by a malicious node that intermittently activates all of its nearest neighbors. However, there is no issue with dropping valid packets, generating control overhead, raising the delay for packet [117].…”
Section: A Perception Layer Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…In such instances, a local repair attack may be carried out by a malicious node that intermittently activates all of its nearest neighbors. However, there is no issue with dropping valid packets, generating control overhead, raising the delay for packet [117].…”
Section: A Perception Layer Threatsmentioning
confidence: 99%
“…Spoo�ing attack [100,102] DDoS [155,156] Wormhole attack [115] Sybil attack [115] �looding attack [122] Phishing [143] Sybil attack [115] Local repair attack [117] Flooding attack [161] Fog [104] introduced an SVMbased authentication scheme to protect medical devices from resource depletion. The simulation result showed that the detection accuracy of the SVM classifier exceeds 90%.…”
Section: Classi�icationmentioning
confidence: 99%
“…FNR: The rate of the malevolent node to total normal nodes incorrectly signed as a normal node. [21][22][23][24][25] The calculation is proved by Equation 12. PDR: This criterion represents the rate of packets that were successfully delivered to the destination.…”
Section: Dr = Tpr Tpr + Fnrmentioning
confidence: 99%
“… italicDR=()italicTPRTPR+FNR*1000.24emwhere0.24emAll=italicTPR+italicTNR+italicFPR+italicFNR FPR: The FPR is determined by the total number of nodes mistakenly found as the malevolent nodes divided by the total number of usual nodes 18–20 . Hence, Equation illustrates the italicFPR=()italicFPRFPR+TNR*100,where0.25emitalicTNR=()italicTNRTNR+FPR*100 FNR: The rate of the malevolent node to total normal nodes incorrectly signed as a normal node 21–25 . The calculation is proved by Equation .…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In the cooperative Black-hole attack, there are many malicious nodes that work together to influence network performance [14]. Intrusion Detection and Prevention System can be used for monitoring network operations and detect intruders [15,16].…”
Section: Black-hole Attackmentioning
confidence: 99%