Detection of selective-edge packet attack based on edge reputation in IoT networks

[1]  Xiaojiang Du,et al.  IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..

[2]  Hussein Al-Bahadili,et al.  Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs , 2016 .

[3]  Samuel Marchal,et al.  DÏoT: A Federated Self-learning Anomaly Detection System for IoT , 2018, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[4]  Theodore B. Zahariadis,et al.  A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[5]  Weizhi Meng,et al.  Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.

[6]  Sasu Tarkoma,et al.  IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge , 2020, IEEE Transactions on Network and Service Management.

[7]  Jong-Moon Chung,et al.  Centralized Trust-Based Secure Routing in Wireless Networks , 2018, IEEE Wireless Communications Letters.

[8]  Nasser-Eddine Rikli,et al.  Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks , 2016, Int. J. Distributed Sens. Networks.

[9]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[10]  Philippe Owezarski,et al.  Online and Scalable Unsupervised Network Anomaly Detection Method , 2017, IEEE Trans. Netw. Serv. Manag..

[11]  Xin Liu,et al.  Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning , 2018, 2018 IEEE International Conference on Communications (ICC).

[12]  Dan Pei,et al.  Why it takes so long to connect to a WiFi access point , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[13]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[14]  Reza Fotohi,et al.  Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.

[15]  Yonghee Kim,et al.  A study on the adoption of IoT smart home service: using Value-based Adoption Model , 2017 .

[16]  Yongkang Wang,et al.  Security algorithm of Internet of Things based on ZigBee protocol , 2018, Cluster Computing.

[17]  Jie Li,et al.  DeepDDoS: Online DDoS Attack Detection , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[18]  Nei Kato,et al.  A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.

[19]  Jiankun Hu,et al.  Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[20]  Liang Liu,et al.  Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks , 2019, Future Gener. Comput. Syst..

[21]  Naixue Xiong,et al.  A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks , 2017, The Journal of Supercomputing.

[22]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[23]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.