IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Md. Morshed AlamMd Sajidul Islam SajidWeichao WangJinpeng WeiPublished in: WCNC (2022)
Keyphrases
- malicious nodes
- security problems
- security measures
- key exchange protocol
- malicious attacks
- cyber attacks
- key management
- denial of service attacks
- management system
- security vulnerabilities
- authentication protocol
- security policies
- countermeasures
- information security
- wireless sensor networks
- encryption algorithm
- fault injection
- authentication mechanism
- dos attacks
- security issues
- network security
- cloud computing
- security requirements
- rfid systems
- security threats
- security management
- statistical databases
- big data
- computer networks
- malicious users
- directed graph
- intrusion detection