[HTML][HTML] Development of a model for spoofing attacks in internet of things

F Khan, AA Al-Atawi, A Alomari, A Alsirhani… - Mathematics, 2022 - mdpi.com
Internet of Things (IoT) allows the integration of the physical world with network devices for
proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable …

Impersonation attack detection in IoT networks

DDN Nguyen, K Sood, Y Xiang… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
The deployment of Internet of Things (IoT) networks is growing at an extraordinary speed
from last decade and has expanded the interconnection of billions of nodes, providing a …

[HTML][HTML] IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning

D Marabissi, L Mucchi, A Stomaci - Future Internet, 2022 - mdpi.com
The wide variety of services and applications that shall be supported by future wireless
systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a …

Collusion attacks mitigation in internet of things: a fog based model

Q Yaseen, M Aldwairi, Y Jararweh, M Al-Ayyoub… - Multimedia Tools and …, 2018 - Springer
Collusion attacks are among the major security concerns nowadays due to the growth
exposure in networks and communications. Internet of Things (IoT) environments are an …

A novel mechanism to handle address spoofing attacks in SDN based IoT

H Aldabbas, R Amin - Cluster Computing, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of devices (servers, sensors, nodes, and so
on) used to conduct tasks like health monitoring, production monitoring, business …

[PDF][PDF] DoS/DDoS detection for E-Healthcare in internet of things

I ul Sami, MB Ahmad, M Asif… - International Journal of …, 2018 - researchgate.net
Internet of Things (IoT) has emerged as a new horizon in communication age. IoT has
provided platform to various emerging technologies and applications for growth. E-Health …

A lightweight and scalable physical layer attack detection mechanism for the internet of things (IoT) using hybrid security schema

R Fotohi, H Pakdel - Wireless Personal Communications, 2021 - Springer
Abstract The Internet of Things, also known as the IoT, refers to the billions of devices
around the world that are now connected to the Internet, collecting and sharing data. The …

Critical and comparative analysis of DoS and version number attack in healthcare IoT system

SS Ambarkar, N Shekokar - Proceeding of First Doctoral Symposium on …, 2021 - Springer
Recently the entire world is witnessing the pandemic outbreak of COVID 19, which creates
havoc in the healthcare industry. Error tolerance may lead to death threats for the patient in …

An experimental study of distributed denial of service and sink hole attacks on IoT based healthcare applications

M Mohapatro, I Snigdh - Wireless Personal Communications, 2021 - Springer
With the rapid growth of the Internet-of-Things (IoT) in healthcare and the challenging task of
achieving communication between two devices working on different protocols, concerns …

Detecting forwarding misbehavior in clustered iot networks

N Venkata Abhishek, A Tandon, TJ Lim… - Proceedings of the 14th …, 2018 - dl.acm.org
Internet of Things (IoT) devices in clustered wireless networks can be compromised by
compromising the gateway which they are associated with. In such scenarios, an adversary …