Articles with "insider attack" as a keyword



Photo by nampoh from unsplash

Malicious Insider Attack Detection in IoTs Using Data Analytics

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2019.2959047

Abstract: Internet of Things (IoTs) are set to revolutionize our lives and are widely being adopted nowadays. The IoT devices have a range of applications including smart homes, smart industrial networks and healthcare. Since these devices… read more here.

Keywords: insider; insider attack; iot devices; security ... See more keywords
Photo by nampoh from unsplash

Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2019.2933464

Abstract: The radical advancement in web services has drawn more attention toward intensifying the security of numerous applications that interact and serve the Internet users. In order to access the different applications on the web, users… read more here.

Keywords: authentication; insider; insider attack; password ... See more keywords
Photo by nampoh from unsplash

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2018.2878151

Abstract: In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake… read more here.

Keywords: dao insider; rpl; insider attack; insider ... See more keywords