2021 IEEE Symposium Series on Computational Intelligence (SSCI) 2021
DOI: 10.1109/ssci50451.2021.9660066
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement Learning-assisted Threshold Optimization for Dynamic Honeypot Adaptation to Enhance IoBT Networks Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…T HE Internet of Things (IoT) is an intelligent technology that is used in different areas and has significantly improved in terms of development and deployment [1]. The Internet of Battlefield Things (IoBT) is an emerging IoT technology for defense applications [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…T HE Internet of Things (IoT) is an intelligent technology that is used in different areas and has significantly improved in terms of development and deployment [1]. The Internet of Battlefield Things (IoBT) is an emerging IoT technology for defense applications [2].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, various IoT devices, such as drones, weapons, wearable devices, and other equipment, are necessary to support military activities. The IoBT environment has many different characteristics compared to other environments, such as high mobility, dynamic topology, and less infrastructure [1].Hence, complexity increases as a result of all of these IoBT characteristics [5]. For real-time data exchange on the battlefield and collaborative decision making among commanders, network connectivity between various combat units is crucial [6].…”
Section: Introductionmentioning
confidence: 99%
“…Many methods have been proposed to protect the identity of the node and its location. The use of security deception in cyber defense is a promising strategy that has attracted the interest of researchers [ 5 ]. Some of the deception methods include, but are not limited to.…”
Section: Introductionmentioning
confidence: 99%