2020
DOI: 10.1007/s11227-019-03137-5
|View full text |Cite
|
Sign up to set email alerts
|

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

Abstract: The Internet of Things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets don't reach the destination. The proposed method is based on the AOD… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
3

Relationship

4
6

Authors

Journals

citations
Cited by 86 publications
(55 citation statements)
references
References 31 publications
0
55
0
Order By: Relevance
“…Abin = and the coordinates of an antigen are ( ) 1, 2, , Agi Agi Agi Agin = ; the distance between them, , D is the affinity [23]. We can use Eq.…”
Section: 2 Abi Abi Abimentioning
confidence: 99%
“…Abin = and the coordinates of an antigen are ( ) 1, 2, , Agi Agi Agi Agin = ; the distance between them, , D is the affinity [23]. We can use Eq.…”
Section: 2 Abi Abi Abimentioning
confidence: 99%
“…Defining an objective function for a feature selection problem requires a classification algorithm. Regarding the fact that most of the researchers prefer to use the simplest classification method for feature selection, which is known as K-nearest neighbors (KNN) classifier [41][42][43][44][45][46][47][48], we use the same method to define the objective function of the feature selection problem in the present paper. Here, Equation 14is used as a multi-objective function for feature selection:…”
Section: -2-1 Dataset and Objective Functionmentioning
confidence: 99%
“…Moreover, NLEE algorithm guarantees better utilization of the energy available in the nodes. It also regularizes routing delay while discovering the shortest path in the network [13][14][15][16][17][18]. Table 1, summarizes the investigated efforts to design multi-path routing for IoT.…”
Section: Aomdv-iot Techniquementioning
confidence: 99%