A Table Based Attack Detection (TBAD) scheme for Internet of Things: An approach for Smart City Environment

被引:4
作者
Simpson, Serin, V [1 ]
Nagarajan, G. [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
来源
2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI) | 2021年
关键词
Smart Cities; IoT; Edge Computing; MEC; TBAD; MANAGEMENT;
D O I
10.1109/ESCI50559.2021.9396929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
People wish to live in smart cities due to the better lifestyle that can be offered by such environments to the residents. Smart cities have been developed with the help of 'Internet of Things' (IoT) network. The increased acceptance became a reason for the attackers to choose such environments as their first choice. Many attacks are present in the IoT network, which can directly affect the integrity of data and the smooth working of IoT network. The data integrity can be assured by using any of the existing end-to-end encryption schemes. But, the Denial of Service (DoS) attacks can harm the IoT network, if the system fails to find the source of attack. The attacking strategy and the pattern will differ each time, even for the same kind of attack. The proposed work mainly focuses on packet drop attacks and the way to detect the strategically different dropping attacks. This work gives an optimal solution to detect and prevent the gray hole and selfish node attacks present in Edge based Smart City environment. The proposed Table Based Attack Detection Scheme (TBAD) is a table based approach developed for the malicious free communication in Smart City Environment.
引用
收藏
页码:696 / 701
页数:6
相关论文
共 16 条
  • [1] Enhancing Identifier/Locator Splitting Through Social Internet of Things
    Atzori, Luigi
    Campolo, Claudia
    Da, Bin
    Girau, Roberto
    Iera, Antonio
    Morabito, Giacomo
    Quattropani, Salvatore
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 2974 - 2985
  • [2] An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
    Cai, Ruo Jun
    Li, Xue Jun
    Chong, Peter Han Joo
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (01) : 42 - 55
  • [3] Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence
    Deng, Shuiguang
    Zhao, Hailiang
    Fang, Weijia
    Yin, Jianwei
    Dustdar, Schahram
    Zomaya, Albert Y.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7457 - 7469
  • [4] Secure routing in mobile Ad hoc networks: a predictive approach
    Desai A.M.
    Jhaveri R.H.
    [J]. International Journal of Information Technology, 2019, 11 (2) : 345 - 356
  • [5] A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
    Fang, Weidong
    Zhang, Wuxiong
    Xiao, Jinchao
    Yang, Yang
    Chen, Wei
    [J]. SENSORS, 2017, 17 (06):
  • [6] Toward the Internet of Things for Physical Internet: Perspectives and Challenges
    Hoa Tran-Dang
    Krommenacker, Nicolas
    Charpentier, Patrick
    Kim, Dong-Seong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06): : 4711 - 4736
  • [7] Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    Zhong, Yubin
    Sangaiah, Arun Kumar
    [J]. IEEE ACCESS, 2018, 6 : 20085 - 20103
  • [8] Self-organized key management with trusted certificate exchange in MANET
    John, Saju P.
    Samuel, Philip
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2015, 6 (01) : 161 - 170
  • [9] Edge QoE: Computation Offloading With Deep Reinforcement Learning for Internet of Things
    Lu, Haodong
    He, Xiaoming
    Du, Miao
    Ruan, Xiukai
    Sun, Yanfei
    Wang, Kun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9255 - 9265
  • [10] Analytical Model for Sybil Attack Phases in Internet of Things
    Mishra, Alekha Kumar
    Tripathy, Asis Kumar
    Puthal, Deepak
    Yang, Laurence T.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 379 - 387