dc.contributor.author |
Okegbile, S.D. (Samuel)
|
|
dc.contributor.author |
Ogunranti, Olabisi I.
|
|
dc.date.accessioned |
2021-05-03T08:47:59Z |
|
dc.date.available |
2021-05-03T08:47:59Z |
|
dc.date.issued |
2020-12 |
|
dc.description.abstract |
Users’ emulation attacks are a prominent denial of service attack capable of degrading the entire performance of the network. In this paper,
the detection and control of users’ emulation attacks in the massive internet of things networks were considered. An efficient power-based
signal to interference ratio (SIR) approach was proposed to characterize the attackers’ behavior in the system. The trust list table was also
adopted to further improve the detection of malicious nodes (MNs). The proposed approach shows an improved performance when compared
with the conventional energy detection based approach which did not capture the channel interference in the system modeling. Through the
received SIR, MNs can be identified owing to the higher transmission power required to disrupt the network. |
en_ZA |
dc.description.department |
Electrical, Electronic and Computer Engineering |
en_ZA |
dc.description.librarian |
pm2021 |
en_ZA |
dc.description.uri |
http://www.elsevier.com/locate/icte |
en_ZA |
dc.identifier.citation |
Samuel D. Okegbile, Olabisi I. Ogunranti,
Users emulation attack management in the massive internet of things enabled environment,
ICT Express,
Volume 6, Issue 4,
2020,
Pages 353-356,
https://doi.org/10.1016/j.icte.2020.06.005. |
en_ZA |
dc.identifier.issn |
2405-9595 (online) |
|
dc.identifier.other |
10.1016/j.icte.2020.06.005 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/79738 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Elsevier |
en_ZA |
dc.rights |
© 2020 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access
article under the CC BY-NC-ND license. |
en_ZA |
dc.subject |
Emulation attack |
en_ZA |
dc.subject |
Malicious user |
en_ZA |
dc.subject |
Success probability |
en_ZA |
dc.subject |
Trust list table |
en_ZA |
dc.subject |
Internet of things (IoT) |
en_ZA |
dc.title |
Users emulation attack management in the massive Internet of Things enabled environment |
en_ZA |
dc.type |
Article |
en_ZA |