2020
DOI: 10.1109/access.2020.2976141
|View full text |Cite
|
Sign up to set email alerts
|

A Reputation Value-Based Early Detection Mechanism Against the Consumer-Provider Collusive Attack in Information-Centric IoT

Abstract: As the Internet of Things (IoT) has connected large number of devices to the Internet, it is urgently needed to guarantee the low latency, security, scalable content distribution of the IoT network. The benefits of Information-Centric Networking (ICN) in terms of fast and efficient data delivery and improved reliability have raised ICN as a highly promising networking model for IoT environments. However, with the widely spread of the viruses and the explosion of kinds of network devices, the attackers can easi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 42 publications
0
10
0
Order By: Relevance
“…ChoKIFA+ [21], Zhi et al [129], FROG [70], IFBN [89], OPT [78], iForest [29], FITT [124], MSIDN [23], mTBAD [62], InterestFence [39], Wu et al [108] Ghali et al [44], Alston et al [17] Fig. 7.…”
Section: Statefull Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…ChoKIFA+ [21], Zhi et al [129], FROG [70], IFBN [89], OPT [78], iForest [29], FITT [124], MSIDN [23], mTBAD [62], InterestFence [39], Wu et al [108] Ghali et al [44], Alston et al [17] Fig. 7.…”
Section: Statefull Solutionsmentioning
confidence: 99%
“…Proactive solutions (12%) Reactive solutions (88%) Salah et al [83], Salah et al [82], Yin et al [114], Cheng et al [31], Alhisnawi et al [16] Nguyen et al [74,72], Xin et al [110], Afanasyev et al [10], Poseidon [33], Dai et al [35], Xin et al [109], Shigeyasu et al [78], DPE [105], TDM [104], Vassilakis et al [98] [46], ChoKIFA [22], ChoKIFA+ [21], Zhi et al [129], FROG [70], IFBN [89], OPT [78], iForest [29], FITT [124], MSIDN [23], mTBAD [62], InterestFence [39], Wu et al [108] Wang et al [107], Zhang et al [121], InterestCash [59], PERSIA [97], BLAM [61] Fig. In a different approach, the solution proposed in [17] uses cryptographic tokens to route packets.…”
Section: Statefull Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the standard attack detection model is required, which could analyze the behavior of attacks in network. The rising of deep learning (DL) has alleviated the limitations of the conventional machine learning (ML) schemes due to the combined implementation of classifier and feature extraction, and its strong representative ability [10] [11] [12] Further, DL model is used for avoiding the overhead of manual selection of features, and that is an essential section for traditional classification systems [13] [14].…”
Section: Introductionmentioning
confidence: 99%
“…In this flow, it is more and more difficult to ensure the security of information systems and the information processed. The mechanisms for detecting cyberattacks are constantly being improved [3][4][5]. However, the development of mechanisms for the implementation of threats also does not stand still.…”
Section: Introductionmentioning
confidence: 99%