[HTML][HTML] Development of a model for spoofing attacks in internet of things
Internet of Things (IoT) allows the integration of the physical world with network devices for
proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable …
proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable …
Impersonation attack detection in IoT networks
The deployment of Internet of Things (IoT) networks is growing at an extraordinary speed
from last decade and has expanded the interconnection of billions of nodes, providing a …
from last decade and has expanded the interconnection of billions of nodes, providing a …
[HTML][HTML] IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning
The wide variety of services and applications that shall be supported by future wireless
systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a …
systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a …
Collusion attacks mitigation in internet of things: a fog based model
Collusion attacks are among the major security concerns nowadays due to the growth
exposure in networks and communications. Internet of Things (IoT) environments are an …
exposure in networks and communications. Internet of Things (IoT) environments are an …
A novel mechanism to handle address spoofing attacks in SDN based IoT
H Aldabbas, R Amin - Cluster Computing, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of devices (servers, sensors, nodes, and so
on) used to conduct tasks like health monitoring, production monitoring, business …
on) used to conduct tasks like health monitoring, production monitoring, business …
[PDF][PDF] DoS/DDoS detection for E-Healthcare in internet of things
Internet of Things (IoT) has emerged as a new horizon in communication age. IoT has
provided platform to various emerging technologies and applications for growth. E-Health …
provided platform to various emerging technologies and applications for growth. E-Health …
A lightweight and scalable physical layer attack detection mechanism for the internet of things (IoT) using hybrid security schema
Abstract The Internet of Things, also known as the IoT, refers to the billions of devices
around the world that are now connected to the Internet, collecting and sharing data. The …
around the world that are now connected to the Internet, collecting and sharing data. The …
Critical and comparative analysis of DoS and version number attack in healthcare IoT system
SS Ambarkar, N Shekokar - Proceeding of First Doctoral Symposium on …, 2021 - Springer
Recently the entire world is witnessing the pandemic outbreak of COVID 19, which creates
havoc in the healthcare industry. Error tolerance may lead to death threats for the patient in …
havoc in the healthcare industry. Error tolerance may lead to death threats for the patient in …
An experimental study of distributed denial of service and sink hole attacks on IoT based healthcare applications
M Mohapatro, I Snigdh - Wireless Personal Communications, 2021 - Springer
With the rapid growth of the Internet-of-Things (IoT) in healthcare and the challenging task of
achieving communication between two devices working on different protocols, concerns …
achieving communication between two devices working on different protocols, concerns …
Detecting forwarding misbehavior in clustered iot networks
Internet of Things (IoT) devices in clustered wireless networks can be compromised by
compromising the gateway which they are associated with. In such scenarios, an adversary …
compromising the gateway which they are associated with. In such scenarios, an adversary …