A Cooperative Smart Jamming Attack in Internet of Things Networks |
Al Sharah, Ashraf
(Department of Electrical Engineering, College of Engineering Technology, Al-Balqa Applied University)
Owida, Hamza Abu (Medical Engineering Department, Al-Ahliyya Amman University) Edwan, Talal A. (Department of Computer Engineering, The University of Jordan) Alnaimat, Feras (Medical Engineering Department, Al-Ahliyya Amman University) |
1 | K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan, China, pp. 663-667, 2013. DOI: 10.1109/CIS.2013.145. DOI |
2 | L. Basyoni, N. Fetais, A. Erbad, A. Mohamed, and M. Guizani, "Traffic analysis attacks on Tor: A survey," in 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, pp. 183-188, 2020. DOI: 10.1109/ICIoT48696.2020.9089497. DOI |
3 | H. Fu, Y. Liu, Z. Dong, and Y. Wu, "A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks," Sensors, vol. 20, no. 1, p. 23, 2020. DOI: 10.3390/s20010023. DOI |
4 | G. Rajendran, R. R. Nivash, P. P. Parthy, and S. Balamurugan, "Modern security threats in the Internet of Things (IoT): Attacks and countermeasures," in 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1-6, 2019. DOI: 10.1109/CCST.2019.8888399. DOI |
5 | S. Choudhary and N. Kesswani, "Detection and prevention of routing attacks in internet of things," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York: NY, USA, pp. 1537-1540. DOI: 10.1109/TrustCom/BigDataSE.2018.00219. DOI |
6 | R. Baskar, P. C. K. Raja, C. Joseph, and M. Reji, "Sinkhole attack in wireless sensor networksperformance analysis and detection methods," Indian Journal of Science and Technology, vol. 10, no. 12, pp. 1-8, May 2017. DOI: 10.17485/ijst/2017/v10i12/90904. DOI |
7 | T. Jamal, Z. Haider, S. A. Butt, and A. Chohan, Denial of service attack in cooperative networks, 2018, [Online] Available: arXiv:1810.11070, 2018. |
8 | A. Rajan, J. Jithish, and S. Sankaran, "Sybil attack in IOT: Modelling and defenses," in Proceedings of 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2323-2327, Udupi, India, 2017. DOI: 10.1109/ICACCI.2017.8126193. DOI |
9 | N. Panda and B. K. Pattanayak, "Analysis of blackhole attack in AODV and DSR," International Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3092-3102, Oct. 2018. DOI: 10.11591/ijece.v8i5.pp3092-3102. DOI |
10 | M. Jeevamaheswari, R. A. Jothi, and V. Palanisamy, "AODV routing protocol to defence against packet dropping gray hole attack In MANET," International Journal of Scientific Research in Science and Technology, Jun. 2018. |
11 | S. Deshmukh-Bhosale and S. S. Sonavane, "A real-time intrusion detection system for wormhole attack in the RPL based internet of things," Procedia Manufacturing, vol. 32, pp. 840-847, 2019. DOI: 10.1016/j.promfg.2019.02.292. DOI |
12 | I. Butun, P. Osterberg, and H. Song, "Security of the internet of things: Vulnerabilities, attacks, and countermeasures," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616-644, Nov. 2019. DOI: 10.1109/COMST.2019.2953364. DOI |
13 | A. Malik, S. Gautam, S. Abidin, and B. Bhushan, "Blockchain technology-future of IoT: Including Structure, limitations and various possible attacks," in Proceedings of 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, pp. 1100-1104, 2019. DOI: 10.1109/ICICICT46008.2019.8993144. DOI |
14 | N. Namvar, W. Saad, N. Bahadori, and B. Kelley, "Jamming in the internet of things: A game-theoretic perspective," in 2016 IEEE Global Communications Conference (GLOBECOM), Washington: DC, USA, pp. 1-6. DOI: 10.1109/GLOCOM.2016.7841922. DOI |
15 | R. Ma, P. Shi, and L. Wu, "Dissipativity-based sliding-mode control of cyber-physical systems under denial-of-service attacks," IEEE Transactions on Cybernetics, vol. 51, no. 5, pp. 2306-2318, Mar. 2020. DOI: 10.1109/TCYB.2020.2975089. DOI |
16 | M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, and S. J. Abdulkadir, "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review," Electronics, vol. 11, no. 2, p. 198, Jan. 2022, DOI: 10.3390/electronics11020198. DOI |
17 | P. Chen, D. Zhang, L. Yu, and H. Yan, "Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 10, pp. 1-13, Oct. 2022. DOI: 10.1109/TSMC.2022.3143903. DOI |
18 | X. Jin, S. Lu, C. Deng, and M. Chadli, "Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks," Information Sciences, vol. 547, pp. 88-102, Feb. 2021. DOI: 10.1016/j.ins.2020.08.013. DOI |
19 | Y. Tian, X. Li, B. Dong, Y. Gao, and L. Wu, "Event-based sliding mode control under denial-of-service attacks," Science China Information Sciences, vol. 65, no. 6, Apr. 2022. DOI: 10.1007/s11432-021-3375-5. DOI |
20 | X. Huang and X. Wang, "Detection and isolation of false data injection attack in intelligent transportation system via robust state observer," Processes, vol. 10, no. 7, p. 1299, Jun. 2022. DOI: 10.3390/pr10071299. DOI |
21 | P. Koloveas, T. Chantzios, S. Alevizopoulou, S. Skiadopoulos, and C. Tryfonopoulos, "inTIME: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence," Electronics, vol. 10, no. 7, p. 818, Mar. 2021. DOI: 10.3390/electronics10070818. DOI |
22 | G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 574-583, Mar. 2015. DOI: 10.1109/TIFS.2015.2390136 DOI |
23 | G. Chen, J. P. Coon, and M. Di Renzo, "Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers," IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1195-1206, May 2017. DOI: 10.1109/TIFS.2017.2656462. DOI |
24 | N. Geethanjali and E. Gayathri, "A survey on energy depletion attacks in wireless sensor networks," International Journal of Science and Research, vol. 3, no. 9, pp. 2070-2074, Sep. 2014. |
25 | M. Labib, S. Ha, W. Saad, and J. H. Reed, "A colonel blotto game for anti-jamming in the internet of things," in 2015 IEEE Global Communications Conference (GLOBECOM), San Diego: CA, USA, pp. 1-6, 2015. DOI: 10.1109/GLOCOM.2015.7417437. DOI |
26 | M. N. Aman, M. H. Basheer, S. Dash, J. W. Wong, J. Xu, H.W. Lim, and B. Sikdar, "HAtt: Hybrid remote attestation for the internet of things with high availability," IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7220-7233, Aug. 2020. DOI: 10.1109/JIOT.2020. 2983655. DOI |
27 | M. U. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, "A review on internet of things (IoT)," International Journal of Computer Applications, vol. 113, no. 1, pp. 1-7, Mar. 2015. DOI: 10.5120/19787-1571. DOI |