Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem.
Tayebeh SahraneshinRazieh MalekhosseiniFarhad RadS. Hadi YaghoubyanPublished in: Wirel. Networks (2023)
Keyphrases
- decision making
- information security
- countermeasures
- group decision making
- decision makers
- multi criteria
- multi criteria decision making
- management system
- security problems
- intuitionistic fuzzy
- cryptographic algorithms
- transitive closure
- decision support system
- ideal solution
- supplier selection
- cellular automata
- decision support
- big data
- cryptographic protocols
- risk assessment
- multiple criteria
- fuzzy logic
- analytic hierarchy process
- supply chain
- intrusion detection
- decision process
- communication systems
- influence diagrams
- data mining
- mobile ad hoc networks
- security mechanisms
- watermarking algorithm
- main memory
- network security
- communication networks