2017
DOI: 10.1007/978-3-319-53480-0_82
|View full text |Cite
|
Sign up to set email alerts
|

Trust Intrusion Detection System Based on Location for Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Also, these malicious nodes may modify and tamper with the timestamps of a message with multiple identities, which can cause havoc to synchronise local clocks in IoT devices. Maddar, Kammoun & Youssef (2017) proposed an innovative detection method for Sybil nodes with fake identities before cluster formation in a centralised clustering-based hierarchical network to optimize the usage of the resources. The detection countermeasure works by analysing neighbouring nodes for the received signal strength.…”
Section: Survey Methodologymentioning
confidence: 99%
“…Also, these malicious nodes may modify and tamper with the timestamps of a message with multiple identities, which can cause havoc to synchronise local clocks in IoT devices. Maddar, Kammoun & Youssef (2017) proposed an innovative detection method for Sybil nodes with fake identities before cluster formation in a centralised clustering-based hierarchical network to optimize the usage of the resources. The detection countermeasure works by analysing neighbouring nodes for the received signal strength.…”
Section: Survey Methodologymentioning
confidence: 99%
“…They focused on a type of pollution attack, where malicious nodes can send back a untruthful alarm ranking list via cooperation, in order to compromise the process of alarm aggregation. Maddar et al [120] evaluated a trust-based CIDS under various attacks, such as Hello Flood Attack that uses a powerful radio signal at long range, which seeks to flood part of the network causing false lists of neighbors, and Desynchronization Attack where a hacker attempts to break the connection between two nodes communicating on the network through sending false information to force them being out of synchronization. Meng et al [138] then investigated whether challenge-based CIDNs are suitable for medical smartphone networks (MSNs).…”
Section: )mentioning
confidence: 99%
“…Jin et al [70] then described a CIDN by using Mahalanobis distance to discriminate between the successful/failed interactions of each node, which can enhance the process of trust computation in the aspects of accuracy and efficiency. Maddar et al [120] It is difficult for analysts to handle excessive false alarms, and these false positives may greatly degrade the detection effectiveness. In the literature, building a false alarm filter is an option to enhance the alarm accuracy.…”
Section: )mentioning
confidence: 99%
“…PLUS Parameterized and localized trust management scheme for sensor network security [8]. It utilizes a disseminated way to deal with adjust to various operational conditions and various applications.…”
mentioning
confidence: 99%