Development of a Model for Spoofing Attacks in Internet of Things
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khan, Faheem | - |
dc.contributor.author | Al-Atawi, Abdullah A. | - |
dc.contributor.author | Alomari, Abdullah | - |
dc.contributor.author | Alsirhani, Amjad | - |
dc.contributor.author | Alshahrani, Mohammed Mujib | - |
dc.contributor.author | Khan, Jawad | - |
dc.contributor.author | Lee, Youngmoon | - |
dc.date.accessioned | 2023-05-03T09:38:32Z | - |
dc.date.available | 2023-05-03T09:38:32Z | - |
dc.date.issued | 2022-10 | - |
dc.identifier.issn | 2227-7390 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/112654 | - |
dc.description.abstract | Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of the network. It is a passive attack and can access the Medium Access Control address of some valid users in the network to continue malicious activities. In this paper, an algorithm is proposed for detecting spoofing attacks in IoT using Received Signal Strength (RSS) and Number of Connected Neighbors (NCN). Firstly, the spoofing attack is detected, located and eliminated through Received Signal Strength (RSS) in an inter-cluster network. However, the RSS is not useful against intra-cluster spoofing attacks and therefore the NCN is introduced to detect, identify and eliminate the intra-cluster spoofing attack. The proposed model is implemented in Network Simulator 2 (NS-2) to compare the performance of the proposed algorithm in the presence and absence of spoofing attacks. The result is that the proposed model increases the detection and prevention of spoofing. | - |
dc.format.extent | 16 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | MDPI AG | - |
dc.title | Development of a Model for Spoofing Attacks in Internet of Things | - |
dc.type | Article | - |
dc.publisher.location | 스위스 | - |
dc.identifier.doi | 10.3390/math10193686 | - |
dc.identifier.scopusid | 2-s2.0-85139770706 | - |
dc.identifier.wosid | 000868009900001 | - |
dc.identifier.bibliographicCitation | Mathematics, v.10, no.19, pp 1 - 16 | - |
dc.citation.title | Mathematics | - |
dc.citation.volume | 10 | - |
dc.citation.number | 19 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 16 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Mathematics | - |
dc.subject.keywordPlus | MULTICAST ROUTING PROTOCOL | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordAuthor | spoofing attack | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | RSS | - |
dc.subject.keywordAuthor | NCN | - |
dc.subject.keywordAuthor | healthcare system | - |
dc.subject.keywordAuthor | NS-2 simulator | - |
dc.identifier.url | https://www.mdpi.com/2227-7390/10/19/3686 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.