期刊
JOURNAL OF SYSTEMS ARCHITECTURE
卷 115, 期 -, 页码 -出版社
ELSEVIER
DOI: 10.1016/j.sysarc.2021.102028
关键词
IoT; Trust; Sybil attack; On?Off attack; Recommendation; Malicious; Smart city
资金
- Higher Education Commission (HEC), Pakistan through its initiative of National Center for Cyber Security [2 (1078) /HEC/ME/2018/707]
Smart City technology utilizes IoT to collect data from sensors for various applications, improving performance for end-users. Research focuses on detecting malicious nodes causing service-oriented attacks in smart city applications and networks, using a Context-Based Trust Evaluation System Model.
Smart City technology is an attempt to improve the quality of life of its citizens by providing promising smart solutions for multiple applications. These applications include healthcare monitoring, resource utilization, city resource management, and various public services. Internet of Things (IoT) enables smart city applications to collect data from various sensors and process it for providing numerous smart services to the end-users with improved performance. The diverse nature of IoT network requires the use of multiple types of sensors which produce a huge amount of data. This data is highly vulnerable to multiple service-oriented attacks; therefore, it must be protected during the communication of IoT nodes. This research work has focused on the identification and detection of malicious nodes causing service-oriented attacks in smart city applications and networks. The direct experience of communicating nodes and recommendations from neighboring nodes are collected to formulate a total trust score. The adaptive weights assigned to direct observations and indirect recommendations ensure the effectiveness of the Context-Based Trust Evaluation System Model (CTES) in detecting On?Off attacks. Moreover, context similarity measure calculations filter out those bad nodes which are posing a Sybil Attack. The proposed CTES has also been simulated on Contiki Cooja. The results also validate the effectiveness of CTES in detecting the bad behavior of malicious nodes.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据