All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F21%3A00122050" target="_blank" >RIV/00216224:14330/21:00122050 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.sciencedirect.com/science/article/pii/S2542660521000858" target="_blank" >https://www.sciencedirect.com/science/article/pii/S2542660521000858</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/j.iot.2021.100442" target="_blank" >10.1016/j.iot.2021.100442</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT

  • Original language description

    The 6LoWPAN standard has been widely applied in different Internet of Things (IoT) application domains. However, since the nodes in the IoT are mostly resource constrained, 6LoWPAN is vulnerable to a variety of security attacks. Among others, replication attack is one of the severe security threads to IoT networks. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with two other strategies such as brute-force and first visited strategy via a thorough simulation. The evaluation takes into account the detection probability for compromised attacks, the execution time of transactions and rate of communication failure. The simulation results show that while maintaining detection runtime on average 60 s for up to 1000 nodes, the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks and in turn significantly reduce the communication failure.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Internet of Things; Engineering Cyber Physical Human Systems

  • ISSN

    2543-1536

  • e-ISSN

    2542-6605

  • Volume of the periodical

    16

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    NL - THE KINGDOM OF THE NETHERLANDS

  • Number of pages

    8

  • Pages from-to

    1-8

  • UT code for WoS article

    000723420400014

  • EID of the result in the Scopus database

    2-s2.0-85115010510