NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things
暂无分享,去创建一个
[1] N. Bhalaji,et al. A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol , 2019, ICICCT - 2019.
[2] Reza Fotohi,et al. An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.
[3] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[4] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[5] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[6] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[7] Daniele Miorandi,et al. REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.
[8] Devesh C. Jinwala,et al. Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).
[9] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[10] Shahram Jamali,et al. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .
[11] Mauro Conti,et al. SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[12] Tao Qin,et al. IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.
[13] Sayan Kumar Ray,et al. A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .
[14] G. Geethakumari,et al. Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[15] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[16] Ashutosh Sharma,et al. A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology , 2019, Ad Hoc Networks.
[17] Shahram Behzad,et al. Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .
[18] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .
[19] Dan Deng,et al. Intelligent Secure Communication for Internet of Things With Statistical Channel State Information of Attacker , 2019, IEEE Access.
[20] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[21] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[22] Reza Fotohi,et al. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.
[23] Reza Fotohi,et al. An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .
[24] Wenyuan Xu,et al. Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks , 2019, 2019 Chinese Control Conference (CCC).
[25] Cristina Alcaraz. Security and Privacy Trends in the Industrial Internet of Things , 2019, Advanced Sciences and Technologies for Security Applications.
[26] Shahram Behzad,et al. An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..
[27] Isaac Woungang,et al. T_CAFE: A Trust based Security approach for Opportunistic IoT , 2019, IET Commun..
[28] Roger Woods,et al. Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.
[29] Abdelkamel Tari,et al. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET , 2018, J. Inf. Secur. Appl..
[30] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[31] Jiong Jin,et al. Cyber security framework for Internet of Things-based Energy Internet , 2018, Future Gener. Comput. Syst..
[32] Reza Fotohi,et al. Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..
[33] Ioannis Papaefstathiou,et al. SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.