Secured mobile IOT ecosystem using Enhanced Multi-level Intelligent Trust Scheme

[1]  P. Rani,et al.  Intelligent transportation system for internet of vehicles based vehicular networks for smart cities , 2023, Comput. Electr. Eng..

[2]  N. Kumar,et al.  A Deep Comprehensive Research Architecture, Characteristics, Challenges, Issues, and Benefits of Routing Protocol for Vehicular Ad-Hoc Networks , 2022, Int. J. Distributed Syst. Technol..

[3]  Hisham G. Daoud,et al.  A survey on security in internet of things with a focus on the impact of emerging technologies , 2022, Internet Things.

[4]  P. Prakash,et al.  Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things , 2022, Wireless Personal Communications.

[5]  M. Dutta,et al.  IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things , 2021, IEEE Sensors Journal.

[6]  Khairul Azmi Abu Bakar,et al.  Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model , 2021, Comput. Networks.

[7]  Gholamreza Farahani,et al.  Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks , 2021, Secur. Commun. Networks.

[8]  K. C. Ravishankar,et al.  Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs , 2021, SN Computer Science.

[9]  Xiangjian He,et al.  QASEC: A secured data communication scheme for mobile Ad-hoc networks , 2020, Future Gener. Comput. Syst..

[10]  M. Devi,et al.  Mobile Ad Hoc Networks and Routing Protocols in IoT Enabled Smart Environment: A Review , 2019, Journal of Engineering and Applied Sciences.

[11]  Tao Qin,et al.  IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.

[12]  G. Geethakumari,et al.  Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[13]  Daniele Miorandi,et al.  REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.

[14]  Sayan Kumar Ray,et al.  A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .

[15]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[16]  Samia Allaoua Chelloug,et al.  Energy-Efficient Content-Based Routing in Internet of Things , 2015 .

[17]  Guru Nanak,et al.  A Novel Approach for Preventing Black-Hole Attack in MANETs , 2014 .

[18]  Jaydip Sen,et al.  Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.

[19]  Naziya Hussain,et al.  Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues , 2022, Federated Learning for IoT Applications.

[20]  Sudip Misra,et al.  Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things , 2021, Ad Hoc Networks.

[21]  Nasib Singh Gill,et al.  Novel Algorithm for Enhancing MANET Protocol in Smart Environment , 2019, VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE.

[22]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[23]  Naeem Ahmad,et al.  Minimizing Broadcast Expenses in Clustered Ad-hoc Networks , 2018, J. King Saud Univ. Comput. Inf. Sci..

[24]  Dinesh Goyal,et al.  BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs , 2013 .

[25]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..