2019
DOI: 10.1016/j.comnet.2019.02.019
|View full text |Cite
|
Sign up to set email alerts
|

Efficient physical intrusion detection in Internet of Things: A Node deployment approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…Formula (28) belongs to the revenue function. Players in each game need to actively change their action tactics to maximize the revenue value, check malicious attacks in the mobile network according to the revenue function, and delete the combination of malicious nodes to improve the security performance of the mobile network [12][13][14].…”
Section: Optimization Methods Of Practical Byzantine Fault-mentioning
confidence: 99%
“…Formula (28) belongs to the revenue function. Players in each game need to actively change their action tactics to maximize the revenue value, check malicious attacks in the mobile network according to the revenue function, and delete the combination of malicious nodes to improve the security performance of the mobile network [12][13][14].…”
Section: Optimization Methods Of Practical Byzantine Fault-mentioning
confidence: 99%
“…Though the approach is novel, it is unable to prove its strength in the environment of IoTs as the number of nodes (devices and connections) is large and optimal solution for the incentive is complex with dynamic situations. Energyefficient and quick detection of intrusion is well experimented based on Gaussian distribution [19]. The method emphasizes on the connections among nodes and establishes a relationship among the network parameters and the detection capability.…”
Section: Related Workmentioning
confidence: 99%
“…A reduction of sensory operations while making sure that there is no loss in coverage of the network and at an acceptable distortion margin [8] [20].…”
Section: Sampling Compressionmentioning
confidence: 99%