ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DETECTION OF MALICIOUS NODES IN INTERNET OF THINGS NETWORK USING TRUST MODEL

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.11, No. 03)

Publication Date:

Authors : ;

Page : 62-67

Keywords : IOT; Routing; Trust Detection; Degree of Trust.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Specifically, wormhole attacks are the most vulnerable, and during route are difficult to detect. Different solutions are built to address wormhole attacks, but the wormhole node and tunnel are to a certain degree detected in these techniques. An efficient mechanism is therefore necessary to detect and avoid malicious nodes that are infected by IoT wormhole attacks. The aim of this document is to improve the identification and protection of malicious nodes in IoTs through behavioral detection in the IoT Framework (BD-IoT). This system is responsible for monitoring the malicious activity of network nodes during their mobility and connectivity. The malicious node can be avoided by influencing the packets routed with the extent of confidence. This identification and avoidance helps improve the routing of packets with high data protection across IOT nodes. Our novel BD-IOTF has proved effective by its packet drop rates, fake positive rates, and wormhole sensing time by experimental findings against the traditional trusteeship safety protocol

Last modified: 2022-03-10 18:57:15