2016
DOI: 10.1109/jiot.2016.2516102
|View full text |Cite
|
Sign up to set email alerts
|

Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(51 citation statements)
references
References 30 publications
0
50
0
1
Order By: Relevance
“…Ning et al [38] proposed a hierarchical authentication architecture to provide anonymous data transmission in IoT networks. Cao et al [39] highlighted the impact and importance of ghost attacks on ZigBee based IoT devices. Chen et al [40] proposed an autonomic model-driven cyber security management approach for IoT systems, which can be used to estimate, detect, and respond to cyberattacks with little or no human intervention.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ning et al [38] proposed a hierarchical authentication architecture to provide anonymous data transmission in IoT networks. Cao et al [39] highlighted the impact and importance of ghost attacks on ZigBee based IoT devices. Chen et al [40] proposed an autonomic model-driven cyber security management approach for IoT systems, which can be used to estimate, detect, and respond to cyberattacks with little or no human intervention.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the increases in low frequency, low profile IoTbased attacks [39], TDTC capabilities in detection of U2R and R2L attacks are useful in incident detection and handling. With the widespread adoption of IoT devices and services in our data-centric and Internet-connected societies, ensuring the security of IoT infrastructure is important to ensure a secure and stable society.…”
Section: B Real-world Applicationsmentioning
confidence: 99%
“…The author in [29] suggested a hierarchical authentication framework for managing anonymous information communication over IoT networks. The study in [30] emphasized on the prominence of ghost attacks over ZigBee based IoT devices and in [31], an automated modelbased security mechanism was suggested. This mechanism is utilized to predict, identify and counter cyber-attacks automatically with almost no manual intervention.…”
Section: Related Workmentioning
confidence: 99%
“…There is need to authenticate the user and the system and the methods and processes are evolving [9]. A method for preventing energy depletion security attacks with ZigBee is explained [10]. A review of security challenges and exiting architectures in the fast growing IoT system has been documented [11].…”
Section: Introductionmentioning
confidence: 99%