4.6 Article

Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks

期刊

JOURNAL OF SYSTEMS ARCHITECTURE
卷 115, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.sysarc.2021.102028

关键词

IoT; Trust; Sybil attack; On?Off attack; Recommendation; Malicious; Smart city

资金

  1. Higher Education Commission (HEC), Pakistan through its initiative of National Center for Cyber Security [2 (1078) /HEC/ME/2018/707]

向作者/读者索取更多资源

Smart City technology utilizes IoT to collect data from sensors for various applications, improving performance for end-users. Research focuses on detecting malicious nodes causing service-oriented attacks in smart city applications and networks, using a Context-Based Trust Evaluation System Model.
Smart City technology is an attempt to improve the quality of life of its citizens by providing promising smart solutions for multiple applications. These applications include healthcare monitoring, resource utilization, city resource management, and various public services. Internet of Things (IoT) enables smart city applications to collect data from various sensors and process it for providing numerous smart services to the end-users with improved performance. The diverse nature of IoT network requires the use of multiple types of sensors which produce a huge amount of data. This data is highly vulnerable to multiple service-oriented attacks; therefore, it must be protected during the communication of IoT nodes. This research work has focused on the identification and detection of malicious nodes causing service-oriented attacks in smart city applications and networks. The direct experience of communicating nodes and recommendations from neighboring nodes are collected to formulate a total trust score. The adaptive weights assigned to direct observations and indirect recommendations ensure the effectiveness of the Context-Based Trust Evaluation System Model (CTES) in detecting On?Off attacks. Moreover, context similarity measure calculations filter out those bad nodes which are posing a Sybil Attack. The proposed CTES has also been simulated on Contiki Cooja. The results also validate the effectiveness of CTES in detecting the bad behavior of malicious nodes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据