2021
DOI: 10.1002/spy2.152
|View full text |Cite
|
Sign up to set email alerts
|

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

Abstract: The Internet of Things (IoT) ecosystem allows communication between billions of devices worldwide that are collecting data autonomously. The vast amount of data generated by these devices must be controlled totally securely. The centralized solutions are not capable of responding to these concerns due to security challenges problems. Thus, the Average Packet Transmission RREQ (APT‐RREQ) as an effective solution, has been employed to overcome these concerns to allow for entirely secure communication between dev… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…The authors compared different ML approaches to detect malicious activity and the proposed Hybrid KSVM algorithm for DDoS attack. Their Hybrid KSVM algorithms gave better results with accuracy (92.46%) and precision (95.31%) compared to other ML algorithms [13].…”
Section: Flood Attacks In Vanetmentioning
confidence: 93%
“…The authors compared different ML approaches to detect malicious activity and the proposed Hybrid KSVM algorithm for DDoS attack. Their Hybrid KSVM algorithms gave better results with accuracy (92.46%) and precision (95.31%) compared to other ML algorithms [13].…”
Section: Flood Attacks In Vanetmentioning
confidence: 93%
“…Based on the SDx paradigm, Zarei and Fotohi [21] presented a comprehensive framework for the internet of things software-defined (SD-IoT). In addition to the SD-IoT controller package, the frame contained SD-IoT switches coupled to an IoT gateway and IoT devices connected via an IoT gateway.…”
Section: Literature Surveymentioning
confidence: 99%
“…Considering the structure of MANETs, packet transmission from source to destination in these networks is done in a step by step fashion and some packets might be destroyed along the route. [27][28][29][30] The packet delivery ratio in MANETs is very important. The packet delivery ratio in this type of network is calculated using Equation (6).…”
Section: Performance Metricsmentioning
confidence: 99%