{"title":"物联网对象的开关攻击检测","authors":"V. Suryani, S. Sulistyo, Widyawan","doi":"10.1109/ICCEREC.2018.8712098","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) objects can behave as a harmless or a harmful object while interacting with other. Harmful behavior can be described as an object launching a trust-based attack or an on-off attack to other. In trust management environment, the detection of harmless and harmful behavior of an object is an important issue to create a safe IoT environment. In this paper, we propose a method to detect the on-off attacks for IoT objects. The proposed method consists of the process of detecting a trust-based attack and on-off attack that might be carried out by an object, process of limiting the number of those attacks, and finally blocking the attacker object. The simulation results showed that this method is quite feasible to be applied to IoT objects and capable of producing a fairly short detection time.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"The Detection of On-Off Attacks for the Internet of Things Objects\",\"authors\":\"V. Suryani, S. Sulistyo, Widyawan\",\"doi\":\"10.1109/ICCEREC.2018.8712098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) objects can behave as a harmless or a harmful object while interacting with other. Harmful behavior can be described as an object launching a trust-based attack or an on-off attack to other. In trust management environment, the detection of harmless and harmful behavior of an object is an important issue to create a safe IoT environment. In this paper, we propose a method to detect the on-off attacks for IoT objects. The proposed method consists of the process of detecting a trust-based attack and on-off attack that might be carried out by an object, process of limiting the number of those attacks, and finally blocking the attacker object. The simulation results showed that this method is quite feasible to be applied to IoT objects and capable of producing a fairly short detection time.\",\"PeriodicalId\":250054,\"journal\":{\"name\":\"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEREC.2018.8712098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEREC.2018.8712098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Detection of On-Off Attacks for the Internet of Things Objects
The Internet of Things (IoT) objects can behave as a harmless or a harmful object while interacting with other. Harmful behavior can be described as an object launching a trust-based attack or an on-off attack to other. In trust management environment, the detection of harmless and harmful behavior of an object is an important issue to create a safe IoT environment. In this paper, we propose a method to detect the on-off attacks for IoT objects. The proposed method consists of the process of detecting a trust-based attack and on-off attack that might be carried out by an object, process of limiting the number of those attacks, and finally blocking the attacker object. The simulation results showed that this method is quite feasible to be applied to IoT objects and capable of producing a fairly short detection time.