MTD, where art thou? A systematic review of moving target defense techniques for IoT

RE Navas, F Cuppens, NB Cuppens… - IEEE internet of …, 2020 - ieeexplore.ieee.org
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …

An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks

Y Zhou, G Cheng, S Yu - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming truly ubiquitous in every domain of human lives, and
a large number of objects can be connected and enabled to communicate with cloud servers …

Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey

M Nguyen, S Debroy - Security and Communication Networks, 2022 - Wiley Online Library
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …

A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network

B Pang, Z Teng, H Sun, C Du, M Li… - IEEE wireless …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several
threats, one of which is dishonest recommendation attacks providing false trust values that …

[HTML][HTML] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception

Z Rehman, I Gondal, M Ge, H Dong, M Gregory… - Computers & …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has become increasingly prevalent in various aspects of
our lives, enabling billions of devices to connect and communicate seamlessly. However …

Reliable cybertwin-driven concurrent multipath transfer with deep reinforcement learning

C Yu, W Quan, D Gao, Y Zhang, K Liu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
It is well known that concurrent multipath transfer (CMT) can improve the transmission rate.
However, due to multiple heterogeneous paths from users to the access network, a large …

Routing optimization of sensor nodes in the Internet of Things based on genetic algorithm

Z Xue - IEEE sensors journal, 2021 - ieeexplore.ieee.org
As an important part of the perception layer of the Internet of things, wireless sensor
networks will provide sensing data for the application of the Internet of things, so it is …

MASK: practical source and path verification based on Multi-AS-Key

S Fu, Q Li, M Zhu, X Wang, S Yao… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
The source and path verification in Path-Aware Networking considers the two critical
issues:(1) end hosts could verify that the network follows their forwarding decisions, and (2) …

Trust and reputation management for securing collaboration in 5g access networks: The road ahead

I Ahmad, KLA Yau, MH Ling, SL Keoh - IEEE Access, 2020 - ieeexplore.ieee.org
Trust represents the belief or perception of an entity, such as a mobile device or a node, in
the extent to which future actions and reactions are appropriate in a collaborative …

Resource-conserving protection against energy draining (RCPED) routing protocol for wireless sensor networks

P Gong, TM Chen, P Xu - Network, 2022 - mdpi.com
This paper proposes a routing protocol for wireless sensor networks to deal with energy-
depleting vampire attacks. This resource-conserving protection against energy-draining …