Matches in SemOpenAlex for { <https://semopenalex.org/work/W2968931736> ?p ?o ?g. }
- W2968931736 abstract "Summary Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health‐care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge‐based IoT environment has several security and privacy issues similar to those for the cloud‐based IoT environment. Various types of attacks, such as “replay, man‐in‐the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge‐based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge‐based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end‐to‐end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge‐based IoT environment called as RAD‐EI. We simulate RAD‐EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD‐EI to prove its resilience against routing attacks. RAD‐EI accomplishes around 95.0 % “detection rate” and 1.23 % “false positive rate” that are notably better than other related existing schemes. In addition, RAD‐EI is efficient in terms of computation and communication costs. As a result, RAD‐EI is a good match for some critical and sensitive applications, such as smart security and surveillance system." @default.
- W2968931736 created "2019-08-22" @default.
- W2968931736 creator A5004320904 @default.
- W2968931736 creator A5011213078 @default.
- W2968931736 creator A5058790065 @default.
- W2968931736 creator A5059795239 @default.
- W2968931736 creator A5065526646 @default.
- W2968931736 creator A5076776322 @default.
- W2968931736 date "2019-08-08" @default.
- W2968931736 modified "2023-10-01" @default.
- W2968931736 title "RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment" @default.
- W2968931736 cites W1866312296 @default.
- W2968931736 cites W1969609037 @default.
- W2968931736 cites W1980035202 @default.
- W2968931736 cites W1984398886 @default.
- W2968931736 cites W1990913136 @default.
- W2968931736 cites W1998025795 @default.
- W2968931736 cites W2002993310 @default.
- W2968931736 cites W2007287631 @default.
- W2968931736 cites W2017623308 @default.
- W2968931736 cites W2028468875 @default.
- W2968931736 cites W2029693536 @default.
- W2968931736 cites W2033106385 @default.
- W2968931736 cites W2035203720 @default.
- W2968931736 cites W2048733507 @default.
- W2968931736 cites W2067948398 @default.
- W2968931736 cites W2071116430 @default.
- W2968931736 cites W2075763135 @default.
- W2968931736 cites W2086576140 @default.
- W2968931736 cites W2089815659 @default.
- W2968931736 cites W2093091126 @default.
- W2968931736 cites W2097965741 @default.
- W2968931736 cites W2099574482 @default.
- W2968931736 cites W2101709734 @default.
- W2968931736 cites W2105114022 @default.
- W2968931736 cites W2111619626 @default.
- W2968931736 cites W2115411894 @default.
- W2968931736 cites W2121720842 @default.
- W2968931736 cites W2124363451 @default.
- W2968931736 cites W2131431171 @default.
- W2968931736 cites W2139542268 @default.
- W2968931736 cites W2141634081 @default.
- W2968931736 cites W2162565149 @default.
- W2968931736 cites W2168204607 @default.
- W2968931736 cites W2308814875 @default.
- W2968931736 cites W2437112748 @default.
- W2968931736 cites W2517578794 @default.
- W2968931736 cites W2546016631 @default.
- W2968931736 cites W2592056285 @default.
- W2968931736 cites W2609109743 @default.
- W2968931736 cites W2751446091 @default.
- W2968931736 cites W2773617726 @default.
- W2968931736 cites W2790549555 @default.
- W2968931736 cites W3097991524 @default.
- W2968931736 doi "https://doi.org/10.1002/dac.4024" @default.
- W2968931736 hasPublicationYear "2019" @default.
- W2968931736 type Work @default.
- W2968931736 sameAs 2968931736 @default.
- W2968931736 citedByCount "26" @default.
- W2968931736 countsByYear W29689317362019 @default.
- W2968931736 countsByYear W29689317362020 @default.
- W2968931736 countsByYear W29689317362021 @default.
- W2968931736 countsByYear W29689317362022 @default.
- W2968931736 countsByYear W29689317362023 @default.
- W2968931736 crossrefType "journal-article" @default.
- W2968931736 hasAuthorship W2968931736A5004320904 @default.
- W2968931736 hasAuthorship W2968931736A5011213078 @default.
- W2968931736 hasAuthorship W2968931736A5058790065 @default.
- W2968931736 hasAuthorship W2968931736A5059795239 @default.
- W2968931736 hasAuthorship W2968931736A5065526646 @default.
- W2968931736 hasAuthorship W2968931736A5076776322 @default.
- W2968931736 hasConcept C110875604 @default.
- W2968931736 hasConcept C111919701 @default.
- W2968931736 hasConcept C127413603 @default.
- W2968931736 hasConcept C136764020 @default.
- W2968931736 hasConcept C158379750 @default.
- W2968931736 hasConcept C162307627 @default.
- W2968931736 hasConcept C2778456923 @default.
- W2968931736 hasConcept C31258907 @default.
- W2968931736 hasConcept C38652104 @default.
- W2968931736 hasConcept C38822068 @default.
- W2968931736 hasConcept C41008148 @default.
- W2968931736 hasConcept C62611344 @default.
- W2968931736 hasConcept C66938386 @default.
- W2968931736 hasConcept C74172769 @default.
- W2968931736 hasConcept C76155785 @default.
- W2968931736 hasConcept C79974875 @default.
- W2968931736 hasConcept C81860439 @default.
- W2968931736 hasConceptScore W2968931736C110875604 @default.
- W2968931736 hasConceptScore W2968931736C111919701 @default.
- W2968931736 hasConceptScore W2968931736C127413603 @default.
- W2968931736 hasConceptScore W2968931736C136764020 @default.
- W2968931736 hasConceptScore W2968931736C158379750 @default.
- W2968931736 hasConceptScore W2968931736C162307627 @default.
- W2968931736 hasConceptScore W2968931736C2778456923 @default.
- W2968931736 hasConceptScore W2968931736C31258907 @default.
- W2968931736 hasConceptScore W2968931736C38652104 @default.
- W2968931736 hasConceptScore W2968931736C38822068 @default.
- W2968931736 hasConceptScore W2968931736C41008148 @default.
- W2968931736 hasConceptScore W2968931736C62611344 @default.