Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/12926
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYaman, Okan-
dc.contributor.authorSokat, Barış-
dc.contributor.authorAyav, Tolga-
dc.contributor.authorErten, Yusuf Murat-
dc.date.accessioned2023-02-05T13:25:02Z-
dc.date.available2023-02-05T13:25:02Z-
dc.date.issued2022-
dc.identifier.isbn978-166545995-2-
dc.identifier.urihttps://doi.org/10.1109/IISEC56263.2022.9998204-
dc.identifier.urihttps://hdl.handle.net/11147/12926-
dc.description3rd International Informatics and Software Engineering Conference, IISEC 2022--15 December 2022 through 16 December 2022en_US
dc.description.abstractAs the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof3rd International Informatics and Software Engineering Conference, IISEC 2022en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectIoT networksen_US
dc.subjectRPLen_US
dc.subjectSelective forwarding attacksen_US
dc.subjectWSNen_US
dc.subjectLow power electronicsen_US
dc.subjectNetwork securityen_US
dc.subjectInternet of thingsen_US
dc.titleA novel countermeasure for selective forwarding attacks in IoT networksen_US
dc.typeConference Objecten_US
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.scopus2-s2.0-85146367874en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanen_US
dc.identifier.doi10.1109/IISEC56263.2022.9998204-
dc.authorscopusid57200543556-
dc.authorscopusid58067724200-
dc.authorscopusid13408184500-
dc.authorscopusid55665216700-
dc.identifier.wosqualityN/A-
dc.identifier.scopusqualityN/A-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
crisitem.author.dept01. Izmir Institute of Technology-
crisitem.author.dept03.04. Department of Computer Engineering-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
A_Novel_Countermeasure.pdf304.57 kBAdobe PDFView/Open
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

3
checked on Nov 15, 2024

Page view(s)

216
checked on Nov 18, 2024

Download(s)

112
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.