IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Md. Morshed AlamMd Sajidul Islam SajidWeichao WangJinpeng WeiPublished in: CoRR (2022)
Keyphrases
- malicious nodes
- security measures
- malicious attacks
- security problems
- key exchange protocol
- information security
- security vulnerabilities
- key management
- cyber attacks
- management system
- malicious users
- countermeasures
- fault injection
- security requirements
- authentication mechanism
- denial of service attacks
- access control
- security policies
- intrusion detection
- cloud computing
- security management
- security risks
- mobile agent system
- authentication protocol
- statistical databases
- information leakage
- security properties
- encryption algorithm
- security mechanisms
- security issues
- network security
- directed graph