RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Sentinel Based Malicious Relay Detection in Wireless IoT Networks

        Anshoo Tandon,Teng Joon Lim,Utku Tefek 한국통신학회 2019 Journal of communications and networks Vol.21 No.5

        Increased device connectivity and information sharingin wireless IoT networks increases the risk of cyber attack by maliciousnodes. In this paper, we present an effective and practicalscheme for detecting data integrity and selective forwarding attackslaunched by malicious relays in wireless IoT networks. Theproposed scheme exploits the broadcast nature of wireless transmissionand provides a sentinel based approach to intrusion detection. Our detection scheme assumes a general noise model for thenetwork where different wireless links may have different packeterror probability (PEP). Further, our detection scheme is effectiveeven in scenarios where different wireless links in the networkemploy distinct modulation and coding schemes at the physicallayer. This detection scheme has application in practical wirelessIoT networks, such as those based on the recently introduced IEEE802.11ah standard.

      • KCI등재

        Malicious Relay Detection Using Sentinels: A Stochastic Geometry Framework

        Utku Tefek,Anshoo Tandon,Teng Joon Lim 한국통신학회 2020 Journal of communications and networks Vol.22 No.4

        Next generation wireless networks are under high riskof security attacks due to increased connectivity and informationsharing among peer nodes. Some of the nodes could potentially bemalicious, intending to disrupt or tamper sensitive data transfer inthe network. In this paper, we present a detailed analysis of the sentinel based data integrity attack detection of malicious relays usinga stochastic geometry framework. We assume a practical channelmodel for each wireless link and apply a stochastic geometry approach to interference modeling. Two detection schemes depending on the level of connectivity between sentinel devices are proposed: isolated and co-operative detection. For both schemes, attack detection probability is derived as a function of important network parameters, and the minimum density of sentinels to achievea given detection probability is calculated. It will be shown that areasonable attack detection probability can be achieved even whenthe sentinel node density is much lower than the relay node density.

      • KCI등재

        Trust-based Adversary Detection in Edge Computing Assisted Vehicular Networks

        Nalam Venkata Abhishek,Teng Joon Lim 한국통신학회 2022 Journal of communications and networks Vol.24 No.4

        Low-latency requirements of vehicular networks can be met by installing mobile edge hosts that implement mobile edge computing in the roadside units (RSUs). Adversaries can, however, compromise these RSUs and use them to launch cyber attacks. In this paper, we consider an adversary that selectively drops packets or selectively corrupts packets between the RSU and passing vehicles. Such strategies would lead to a higher number of re-transmissions and thereby increase the latency of the network, which in turn impacts critical delay-sensitive applications like collision avoidance, emergency vehicle warning, etc. We propose to use trust-based detection systems to detect such an adversary. Each vehicle transmits its uplink and downlink trust values about every RSU it has interacted with. These trust values are relayed to the RSU gateway, where the decision will be made, via the next RSU encountered by a vehicle. At regular intervals, the gateway aggregates the uplink and downlink trust values obtained from multiple vehicles. It compares them against their respective thresholds to classify the RSU as benign or malicious. We also consider the presence of malicious vehicles trying to deceive the detection system by reporting false trust values. A detection mechanism is proposed to detect such vehicles. Simulation results generated using MATLAB are presented to demonstrate the performance of the proposed detection mechanisms and the impact of the adversary’s parameters on the detection systems.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼