Abstract | ||
---|---|---|
Devices in the Internet of Things (IoT) produce large amounts of sensitive data. However, the use of the public Internet for data transfer by IoT devices makes them susceptible to cyber attacks. Among these attacks, data tampering or modification attacks to disrupt or bias the states of applications using these data may result in widespread damage and outages. To detect such attacks, this paper pr... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/JIOT.2018.2833206 | IEEE Internet of Things Journal |
Keywords | Field | DocType |
Data integrity,Protocols,Servers,Internet of Things,Sensors,Reliability | Data transmission,Computer science,Server,Permutation,Computer network,Data integrity,Security analysis,Time-hopping,The Internet,Distributed computing,Computational complexity theory | Journal |
Volume | Issue | ISSN |
5 | 4 | 2327-4662 |
Citations | PageRank | References |
3 | 0.39 | 0 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Muhammad Aman | 1 | 62 | 13.40 |
Biplab Sikdar | 2 | 1057 | 106.78 |
Kee-Chaing Chua | 3 | 2145 | 156.27 |
Anwar Ali | 4 | 3 | 1.41 |