2018 IEEE International Conference on Communications (ICC) 2018
DOI: 10.1109/icc.2018.8422484
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
37
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(37 citation statements)
references
References 7 publications
0
37
0
Order By: Relevance
“…-We use the K-Means method to cluster nodes into benign group and malicious group. For the performance analysis, we compare our approach with two similar approaches: Perceptron Detection with Enhancement (PDE) [8] and Hard Detection (HD) [9]. The experimental results demonstrate that DCONST could achieve better detection performance.…”
Section: Introductionmentioning
confidence: 99%
“…-We use the K-Means method to cluster nodes into benign group and malicious group. For the performance analysis, we compare our approach with two similar approaches: Perceptron Detection with Enhancement (PDE) [8] and Hard Detection (HD) [9]. The experimental results demonstrate that DCONST could achieve better detection performance.…”
Section: Introductionmentioning
confidence: 99%
“…This is a clear indication of how following a proper SE process could affect the performance of the IDS in WSN. Moreover, conclusions were drawn in regard to applying software engineering processes to IDSs to deliver the required functionalities, with respect to operational constraints, with an improved performance, accuracy and reliability.Security concerns have become particularly acute in systems deployed over wireless networks [7][8][9][10][11][12]. In recent years, advances in micro-electronic systems technology, digital electronics, and wireless communications that have enabled the development of Wireless Sensor Networks (WSNs) [6,13] have been witnessed.…”
mentioning
confidence: 99%
“…However, hostile environments are usually unattended. Due to that, WSNs lack physical protection (e.g., no switches or gateways to monitor the flow of information) resulting a potential of node compromising as well as low network security and protection [10,15,19]. Therefore, it is important to secure such networks from intrusions and attacks, especially in applications where security services are important.…”
mentioning
confidence: 99%
See 2 more Smart Citations