Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/12926
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yaman, Okan | - |
dc.contributor.author | Sokat, Barış | - |
dc.contributor.author | Ayav, Tolga | - |
dc.contributor.author | Erten, Yusuf Murat | - |
dc.date.accessioned | 2023-02-05T13:25:02Z | - |
dc.date.available | 2023-02-05T13:25:02Z | - |
dc.date.issued | 2022 | - |
dc.identifier.isbn | 978-166545995-2 | - |
dc.identifier.uri | https://doi.org/10.1109/IISEC56263.2022.9998204 | - |
dc.identifier.uri | https://hdl.handle.net/11147/12926 | - |
dc.description | 3rd International Informatics and Software Engineering Conference, IISEC 2022--15 December 2022 through 16 December 2022 | en_US |
dc.description.abstract | As the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 3rd International Informatics and Software Engineering Conference, IISEC 2022 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | IoT networks | en_US |
dc.subject | RPL | en_US |
dc.subject | Selective forwarding attacks | en_US |
dc.subject | WSN | en_US |
dc.subject | Low power electronics | en_US |
dc.subject | Network security | en_US |
dc.subject | Internet of things | en_US |
dc.title | A novel countermeasure for selective forwarding attacks in IoT networks | en_US |
dc.type | Conference Object | en_US |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.scopus | 2-s2.0-85146367874 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Eleman | en_US |
dc.identifier.doi | 10.1109/IISEC56263.2022.9998204 | - |
dc.authorscopusid | 57200543556 | - |
dc.authorscopusid | 58067724200 | - |
dc.authorscopusid | 13408184500 | - |
dc.authorscopusid | 55665216700 | - |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 01. Izmir Institute of Technology | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
A_Novel_Countermeasure.pdf | 304.57 kB | Adobe PDF | View/Open |
CORE Recommender
SCOPUSTM
Citations
3
checked on Nov 15, 2024
Page view(s)
216
checked on Nov 18, 2024
Download(s)
112
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.