2019
DOI: 10.1186/s13638-019-1402-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

Abstract: The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely used in secure IoT applications like health monitoring. One of the prominent attacks in IoT is the denial of servi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(13 citation statements)
references
References 23 publications
0
12
1
Order By: Relevance
“…In comparising with simular works, our approach demonstrates the better results in DoS attack detection for some indicators (optimal time interval and classification method). For instance, in our research F1-score value reached the value of 0.98 whereas the results of [27] shows only 0.90 and research results of [28] being equal to 0.95.…”
Section: Results and Analysiscontrasting
confidence: 58%
“…In comparising with simular works, our approach demonstrates the better results in DoS attack detection for some indicators (optimal time interval and classification method). For instance, in our research F1-score value reached the value of 0.98 whereas the results of [27] shows only 0.90 and research results of [28] being equal to 0.95.…”
Section: Results and Analysiscontrasting
confidence: 58%
“…Haripriya et al. [15] presented Secure‐MQTT, a lightweight fuzzy logic‐based intrusion detection technique for detecting malicious activities during IoT device communication. With the use of a fuzzy rule interpolation mechanism, the suggested solution employs a fuzzy logic‐based system to identify the node's harmful activity.…”
Section: Related Workmentioning
confidence: 99%
“…Haripriya A. P et.al. [2] introduced the MQTT-based IoT framework which implement a lightweight, fuzzy logic-based intrusion detection scheme called Secure-MQTT. The framework developed provides a significant method to secure low-configuration devices.…”
Section: Literature Surveymentioning
confidence: 99%