IoT-NETZ: Practical spoofing attack mitigation approach in SDWN network

H Mohammadnia, SB Slimane - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
networking devices involved in traffic forwarding and processing can save power consumption
during the attacks … ., “Most vulnerable smart cities to cyber attack on internet of things (iot),” …

Evaluating security of low-power internet of things networks

I Vaccari, E Cambiaso, M Aiello - International Journal of …, 2019 - journal.uob.edu.bh
… The difference between sniffing and man-in-the-middle is that mitm is adopted to alter
received data before forwarding them to the intended recipient (active attack), while sniffing is a …

[PDF][PDF] Intrusion detection system for internet of things

T Sherasiya, H Upadhyay - Int. J. Adv. Res. Innov. Ideas Educ.(IJARIIE), 2016 - Citeseer
… Selective Forwarding Attack: In this attack, malicious node acts as a … attack and Sybil attack
in IoT network. Our proposed system is designed to detect Hello flood attack and Sybil attack

IoT-Sentry: A cross-layer-based intrusion detection system in standardized Internet of Things

M Malik, M Dutta, J Granjal - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
… affect one or more features of the normal operations of the network. For instance, the
blackhole and selective forwarding attacks cause packet loss and UDP and hello flooding attacks

Network flow based IoT botnet attack detection using deep learning

S Sriram, R Vinayakumar, M Alazab… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
… The expansion in the quantity of Internet-of-things (IoT) based botnet attacks is due to the …
used for detecting 2 routing attacks called sinkhole and selective forwarding attacks in IoT. …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - … of Distributed Sensor Networks, 2013 - journals.sagepub.com
… In our implementation of the selective-forwarding attacks we let the malicious node drop all
… Our selective-forwarding attack allows for RPL to function normally, but any application data …

Proactive defense for fog-to-things critical infrastructure

MT Khan, A Akhunzada… - IEEE Communications …, 2022 - ieeexplore.ieee.org
… to identify three different classes of attacks (ie, brute force attacks, cross-site scripting, and …
of an SDN network. Additionally, the SDN controller controls all the SDN network’s forwarding

An intrusion detection system for denial of service attack detection in internet of things

BFLM Sousa, Z Abdelouahab, DCP Lopes… - … on internet of things …, 2017 - dl.acm.org
… In short, it is a routing attack in which the attacker provides new routes for packets, and may
also perform another attack: selective forwarding. By running the selective forwarding attack, …

… ‐DDoS: an agent‐based simulator about strategies of both DDoS attacks and their defenses, to achieve efficient data forwarding in sensor networks and IoT devices

F González-Landero, I García-Magariño… - Wireless …, 2018 - Wiley Online Library
… Sensor networks and Internet of Things (IoT) are useful for many purposes such as military …
Efficient and secure data forwarding is essential to maintain seamless communications and to …

[引用][C] An efficient detection of selective forwarding attacks in heterogeneous IoT Networks

S Khanam, I Ahmedy, MYI Idris - 2017 - FCSIT