2017
DOI: 10.1016/j.comnet.2017.05.027
|View full text |Cite
|
Sign up to set email alerts
|

Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
7

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(34 citation statements)
references
References 28 publications
0
27
0
7
Order By: Relevance
“…Therefore, it is important to have a Intrusion detection system that fulfills two important characteristics: 1) any IDS should not incur significant computational and communication overhead, and 2) IDS should achieve high detection accuracy. In particular, the use of anomaly based detection systems [53] [52] [51] requires more resources than the signature based detection systems while having a tradeoff between detection accuracy and overheads. For instance, anomaly detection is particularly effective against previously unknown attacks, but is expected to incur significant performance overhead.…”
Section: ) Constrained Resources: a Typical Iot Device Hasmentioning
confidence: 99%
“…Therefore, it is important to have a Intrusion detection system that fulfills two important characteristics: 1) any IDS should not incur significant computational and communication overhead, and 2) IDS should achieve high detection accuracy. In particular, the use of anomaly based detection systems [53] [52] [51] requires more resources than the signature based detection systems while having a tradeoff between detection accuracy and overheads. For instance, anomaly detection is particularly effective against previously unknown attacks, but is expected to incur significant performance overhead.…”
Section: ) Constrained Resources: a Typical Iot Device Hasmentioning
confidence: 99%
“…Recent studies in the literature have highlighted the needs of sophisticated IDS to meet security requirements in IoT environments [3,[7][8][9][10]. In a nutshell, IDSs aim to identify attack behavior and locate an attacker within a system [3].…”
Section: Related Workmentioning
confidence: 99%
“…Watchdog is one of most traditional techniques applied to monitor networked system [19]. The authors in [10] proposed an IDS based on watchdog for the detection of false data injection attacks. It takes into account Bayesian Spatial-Temporal Hierarchical Model (HBT) to describe the features of the sensed data, and a sequential probability test is applied to identify an attacking device.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations