scholar.google.com › citations
To detect the malicious nodes that carry out these attacks, we inject some probe packets into the IoT and collect probe packets transmitted in the network. Since the probe packets are designed by us, we can easily analyze the damage of these probe packets.
Feb 1, 2020
For such attacks, an effective method to detect malicious nodes focuses on the received and sent messages of each node. However, gathering messages about each ...
[29] proposes a method to detect malicious nodes in IoT networks using an online learning algorithm. The method involves calculating the credibility of each ...
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks · K. SsuC. Chou ; Research on Trust Model of Sensor Nodes in ...
People also ask
How IoT is used in intrusion detection system?
What are malicious nodes?
What is the secure authentication mechanism to increase the security of the IoT devices?
What are the types of security attacks in IoT?
Jan 11, 2023 · The malicious node uses its' fake identities to impersonate legitimate nodes and transmit misleading data to the central entity. However, ...
Jun 12, 2024 · In real life, malicious nodes can carry out many attacks in social IoT, such as tampering with data, denial of service, negative ...
Feb 1, 2020 · For such attacks, an effective method to detect malicious nodes focuses on the received and sent messages of each node. However, gathering ...
Jan 18, 2022 · In our proposed model, these nodes are detected by GA-DT and GA-SVM. Before detecting MNs, we first synthesize the data for the algorithms. 3.3.
The TABI mechanism utilizes both access control and trust evaluation mechanisms to mitigate the impact of malicious IoT users and devices. Additionally, it ...
In [25] a quarantine slice is used to isolate suspicious flows. However, this work focuses on the detection of malicious nodes (mainly by analyzing network ...