Zero-Trust Empowered Decentralized Security Defense against Poisoning Attacks in SL-IoT: Joint Distance-Accuracy Detection Approach.
Rongxuan SongJun WuQianqian PanMuhammad ImranNiddal NaserRebet JonesChristos V. VerikoukisPublished in: GLOBECOM (2023)
Keyphrases
- security problems
- network security
- intrusion detection
- detection accuracy
- security threats
- security mechanisms
- defense mechanisms
- computer security
- management system
- trust management
- security protocols
- key management
- detection rate
- malicious nodes
- security breaches
- cyber attacks
- cyber defense
- dos attacks
- access control
- information flow control
- ddos attacks
- security requirements
- detection algorithm
- information security
- intrusion detection system
- false positives
- anomaly detection
- security issues
- security services
- denial of service attacks
- attack detection
- misuse detection
- malicious users
- public key infrastructure
- chosen plaintext
- countermeasures
- peer to peer
- information leakage
- java card
- malware detection
- fault injection
- data security
- security policies
- trust model
- security flaws
- computer networks
- distributed denial of service attacks