RSS based multistage statistical method for attack detection and localization in IoT networks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Pervasive and mobile computing Jg. 85; S. 101648
Hauptverfasser: Saxena, Shubham, Pandey, Ankur, Kumar, Sudhir
Format: Journal Article
Sprache:Englisch
Veröffentlicht: 01.09.2022
ISSN:1574-1192
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
ArticleNumber 101648
Author Pandey, Ankur
Kumar, Sudhir
Saxena, Shubham
Author_xml – sequence: 1
  givenname: Shubham
  surname: Saxena
  fullname: Saxena, Shubham
– sequence: 2
  givenname: Ankur
  orcidid: 0000-0001-6820-9722
  surname: Pandey
  fullname: Pandey, Ankur
– sequence: 3
  givenname: Sudhir
  surname: Kumar
  fullname: Kumar, Sudhir
BookMark eNp9kMtOwzAQRb0oEm3hB1j5B1I8jpPYS1TxqFSpEi1LFPlVcJrElW2E4OtJWlYs2MyM7sy9Gp0ZmvS-twjdAFkAgfK2WRw73SwoofQkMD5BUygqlgEIeolmMTaEMGAVmaLX5-0WKxmtwd1Hm1xM8s3ioY6j07LFnU3v3uC9D1imJPUBG5usTs73WPYGt364ct_yJLger_wO9zZ9-nCIV-hiL9tor3_7HL083O-WT9l687ha3q0zTVmVspIX3EgobVUqxqzIFefGgqpErksBlSAFUMULqAzkBbGUCVUIrUCpYW_yfI74OVcHH2Ow-1q7dPooBenaGkg9kqibekRTj2jqM5rBSv9Yj8F1Mnz9Z_oBcGht8Q
CitedBy_id crossref_primary_10_1016_j_segan_2024_101534
crossref_primary_10_1109_JIOT_2023_3343611
crossref_primary_10_1109_JSEN_2024_3504259
crossref_primary_10_1007_s42979_025_04211_x
crossref_primary_10_1016_j_pmcj_2025_102082
Cites_doi 10.1109/COMST.2019.2896380
10.1109/JIOT.2020.2992651
10.1504/IJAHUC.2014.066419
10.1109/TDSC.2018.2889729
10.1145/1062689.1062697
10.1090/S0002-9939-98-04151-3
10.1109/COMST.2019.2911558
10.1109/COMST.2018.2844742
10.1109/ACCESS.2018.2843325
10.1016/j.measurement.2017.05.034
10.1109/JIOT.2020.3047982
10.4304/jcm.6.6.460-470
10.1109/MCOM.2008.4481347
10.1109/TIFS.2017.2668062
10.1109/JSAC.2005.861381
10.1109/ACCESS.2019.2945539
10.1007/s40815-015-0009-4
10.1090/S0025-5718-1975-0393393-9
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.pmcj.2022.101648
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_pmcj_2022_101648
GroupedDBID --K
--M
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
9DU
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
AAYXX
ABBOA
ABFRF
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACLOT
ACNNM
ACRLP
ACRPL
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADMUD
ADNMO
ADTZH
AEBSH
AECPX
AEFWE
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
CITATION
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SCC
SDF
SDG
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
UNMZH
~G-
~HD
ID FETCH-LOGICAL-c247t-6858da16e76b44e93b88de1b793c691790512b8517d1350e249b59cb1bbc69d33
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000855578800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1574-1192
IngestDate Tue Nov 18 22:36:26 EST 2025
Sat Nov 29 07:01:00 EST 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c247t-6858da16e76b44e93b88de1b793c691790512b8517d1350e249b59cb1bbc69d33
ORCID 0000-0001-6820-9722
ParticipantIDs crossref_citationtrail_10_1016_j_pmcj_2022_101648
crossref_primary_10_1016_j_pmcj_2022_101648
PublicationCentury 2000
PublicationDate 2022-09-00
PublicationDateYYYYMMDD 2022-09-01
PublicationDate_xml – month: 09
  year: 2022
  text: 2022-09-00
PublicationDecade 2020
PublicationTitle Pervasive and mobile computing
PublicationYear 2022
References Chaabouni (10.1016/j.pmcj.2022.101648_b16) 2019; 21
Shim (10.1016/j.pmcj.2022.101648_b12) 2017; 12
Chen (10.1016/j.pmcj.2022.101648_b5) 2006
Pandey (10.1016/j.pmcj.2022.101648_b1) 2020; 8
Sadowski (10.1016/j.pmcj.2022.101648_b29) 2018; 6
Zhang (10.1016/j.pmcj.2022.101648_b35) 1998; 126
Boukerche (10.1016/j.pmcj.2022.101648_b13) 2008; 46
Zafari (10.1016/j.pmcj.2022.101648_b32) 2019; 21
Kushki (10.1016/j.pmcj.2022.101648_b31) 2008
Lazos (10.1016/j.pmcj.2022.101648_b10) 2006; 24
Santoro (10.1016/j.pmcj.2022.101648_b26) 2017; 109
Saxena (10.1016/j.pmcj.2022.101648_b4) 2019
Aboelnaga (10.1016/j.pmcj.2022.101648_b8) 2018
Pires (10.1016/j.pmcj.2022.101648_b22) 2004
Sedjelmaci (10.1016/j.pmcj.2022.101648_b28) 2013
Sasikala (10.1016/j.pmcj.2022.101648_b27) 2015; 17
Islam (10.1016/j.pmcj.2022.101648_b37) 2017
Yan (10.1016/j.pmcj.2022.101648_b6) 2017; 11
Marshall (10.1016/j.pmcj.2022.101648_b34) 1979
Bhattacharjee (10.1016/j.pmcj.2022.101648_b9) 2018; 18
10.1016/j.pmcj.2022.101648_b23
10.1016/j.pmcj.2022.101648_b25
Pandey (10.1016/j.pmcj.2022.101648_b21) 2019; 7
Sadowski (10.1016/j.pmcj.2022.101648_b36) 2020; 7
Cheng (10.1016/j.pmcj.2022.101648_b7) 2017
Benkhelifa (10.1016/j.pmcj.2022.101648_b2) 2018; 20
Tung (10.1016/j.pmcj.2022.101648_b33) 1975; 29
Grover (10.1016/j.pmcj.2022.101648_b18) 2014; 17
Goldsmith (10.1016/j.pmcj.2022.101648_b30) 2005
Laoudias (10.1016/j.pmcj.2022.101648_b20) 2010
Conti (10.1016/j.pmcj.2022.101648_b3) 2018
Srinivasan (10.1016/j.pmcj.2022.101648_b15) 2007
Richter (10.1016/j.pmcj.2022.101648_b17) 2018
Lazos (10.1016/j.pmcj.2022.101648_b11) 2005
Chen (10.1016/j.pmcj.2022.101648_b24) 2007
Langendoerfer (10.1016/j.pmcj.2022.101648_b19) 2011; 15
Jiang (10.1016/j.pmcj.2022.101648_b14) 2011; 6
References_xml – volume: 21
  start-page: 2671
  issue: 3
  year: 2019
  ident: 10.1016/j.pmcj.2022.101648_b16
  article-title: Network intrusion detection for IoT security based on learning techniques
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2896380
– start-page: 126
  year: 2007
  ident: 10.1016/j.pmcj.2022.101648_b15
  article-title: A survey on secure localization in wireless sensor networks
– start-page: 1964
  year: 2007
  ident: 10.1016/j.pmcj.2022.101648_b24
  article-title: Attack detection in wireless localization
– start-page: 24
  year: 2004
  ident: 10.1016/j.pmcj.2022.101648_b22
  article-title: Malicious node detection in wireless sensor networks
– volume: 7
  start-page: 10996
  issue: 11
  year: 2020
  ident: 10.1016/j.pmcj.2022.101648_b36
  article-title: Memoryless techniques and wireless technologies for indoor localization with the internet of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.2992651
– start-page: 1
  year: 2017
  ident: 10.1016/j.pmcj.2022.101648_b37
– start-page: 1
  year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b17
  article-title: Attack tolerance of RSS-based fingerprinting
– start-page: 324
  year: 2005
  ident: 10.1016/j.pmcj.2022.101648_b11
  article-title: ROPE: Robust position estimation in wireless sensor networks
– year: 1979
  ident: 10.1016/j.pmcj.2022.101648_b34
– start-page: 543
  year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b8
  article-title: Secure Wi-Fi fingerprinting-based localization
– volume: 17
  start-page: 197
  issue: 4
  year: 2014
  ident: 10.1016/j.pmcj.2022.101648_b18
  article-title: Jamming and anti-jamming techniques in wireless networks: A survey
  publication-title: Int. J. Ad Hoc Ubiquitous Comput.
  doi: 10.1504/IJAHUC.2014.066419
– volume: 18
  start-page: 356
  issue: 1
  year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b9
  article-title: Detection and forensics against stealthy data falsification in smart metering infrastructure
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2018.2889729
– start-page: 546
  year: 2006
  ident: 10.1016/j.pmcj.2022.101648_b5
  article-title: The robustness of localization algorithms to signal strength attacks: A comparative study
– start-page: 1
  year: 2019
  ident: 10.1016/j.pmcj.2022.101648_b4
  article-title: A multistage RSSI-based scheme for node compromise detection in IoT networks
– ident: 10.1016/j.pmcj.2022.101648_b25
  doi: 10.1145/1062689.1062697
– volume: 126
  start-page: 461
  issue: 2
  year: 1998
  ident: 10.1016/j.pmcj.2022.101648_b35
  article-title: Schur-convex functions and isoperimetric inequalities
  publication-title: Proc. Amer. Math. Soc.
  doi: 10.1090/S0002-9939-98-04151-3
– volume: 21
  start-page: 2568
  issue: 3
  year: 2019
  ident: 10.1016/j.pmcj.2022.101648_b32
  article-title: A survey of indoor localization systems and technologies
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2911558
– volume: 20
  start-page: 3496
  issue: 4
  year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b2
  article-title: A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2018.2844742
– volume: 6
  start-page: 30149
  year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b29
  article-title: RSSI-based indoor localization with the Internet of things
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2843325
– volume: 109
  start-page: 79
  year: 2017
  ident: 10.1016/j.pmcj.2022.101648_b26
  article-title: A hybrid intrusion detection system for virtual jamming attacks on wireless networks
  publication-title: Measurement
  doi: 10.1016/j.measurement.2017.05.034
– volume: 8
  start-page: 10665
  issue: 13
  year: 2020
  ident: 10.1016/j.pmcj.2022.101648_b1
  article-title: Adaptive mini-batch gradient-ascent-based localization for indoor IoT networks under Rayleigh fading conditions
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3047982
– year: 2018
  ident: 10.1016/j.pmcj.2022.101648_b3
– volume: 6
  start-page: 460
  issue: 6
  year: 2011
  ident: 10.1016/j.pmcj.2022.101648_b14
  article-title: Secure localization in wireless sensor networks: A survey
  publication-title: J. Commun.
  doi: 10.4304/jcm.6.6.460-470
– volume: 46
  start-page: 96
  issue: 4
  year: 2008
  ident: 10.1016/j.pmcj.2022.101648_b13
  article-title: Secure localization algorithms for wireless sensor networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2008.4481347
– volume: 12
  start-page: 1545
  issue: 7
  year: 2017
  ident: 10.1016/j.pmcj.2022.101648_b12
  article-title: BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2668062
– volume: 24
  start-page: 233
  issue: 2
  year: 2006
  ident: 10.1016/j.pmcj.2022.101648_b10
  article-title: HiRLoc: High-resolution robust localization for wireless sensor networks
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2005.861381
– start-page: 1
  year: 2017
  ident: 10.1016/j.pmcj.2022.101648_b7
  article-title: Time series analysis for jamming attack detection in wireless networks
– start-page: 2065
  year: 2008
  ident: 10.1016/j.pmcj.2022.101648_b31
  article-title: Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning
– volume: 15
  start-page: 39
  year: 2011
  ident: 10.1016/j.pmcj.2022.101648_b19
  article-title: Demonstrating self-contained on-node counter measures for various jamming attacks in wireless sensor networks
  publication-title: SIGMOBILE Mob. Comput. Commun. Rev
– volume: 11
  issue: 9
  year: 2017
  ident: 10.1016/j.pmcj.2022.101648_b6
  article-title: Attack-resistant received signal strength based compressive sensing wireless localization
  publication-title: KSII Trans. Internet. Inf. Syst.
– volume: 7
  start-page: 144354
  year: 2019
  ident: 10.1016/j.pmcj.2022.101648_b21
  article-title: Handling device heterogeneity and orientation using multistage regression for GMM based localization in IoT networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2945539
– volume: 17
  start-page: 76
  issue: 1
  year: 2015
  ident: 10.1016/j.pmcj.2022.101648_b27
  article-title: An intelligent technique to detect jamming attack in wireless sensor networks (WSNs)
  publication-title: Int. J. Fuzzy Syst.
  doi: 10.1007/s40815-015-0009-4
– volume: 29
  start-page: 834
  issue: 131
  year: 1975
  ident: 10.1016/j.pmcj.2022.101648_b33
  article-title: On lower and upper bounds of the difference between the arithmetic and the geometric mean
  publication-title: Math. Comp.
  doi: 10.1090/S0025-5718-1975-0393393-9
– start-page: 1
  year: 2010
  ident: 10.1016/j.pmcj.2022.101648_b20
  article-title: Fault tolerant positioning using WLAN signal strength fingerprints
– ident: 10.1016/j.pmcj.2022.101648_b23
– start-page: 1
  year: 2013
  ident: 10.1016/j.pmcj.2022.101648_b28
  article-title: Efficient and lightweight intrusion detection based on nodes’ behaviors in wireless sensor networks
– year: 2005
  ident: 10.1016/j.pmcj.2022.101648_b30
SSID ssj0041470
Score 2.3336432
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 101648
Title RSS based multistage statistical method for attack detection and localization in IoT networks
Volume 85
WOSCitedRecordID wos000855578800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 1574-1192
  databaseCode: AIEXJ
  dateStart: 20050301
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0041470
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9tAEF5B6IEeEJRWUB7aAzfLUdav3T1GCAQcECJByqWyvA8aAtlEwa7y8zvrtR1DVQQHLpZlr0eW59PM7PibGYROEqllAGGFLzQN_UjQzOcsk76kSUwFJ7EQvXLYBL2-ZqMRr__oPpfjBKgxbLnk809VNVwDZdvS2Q-ouxEKF-AclA5HUDsc36X428HAs75JObIgRH-_bRdZW8Xg8tZuaLSjT-Z5Jh89pXNdjQw3yivdW1WeadMhl7OhZxxb_Lkdy97YfG7JfrdPTWcCDExJUS_y2h_a1E221K7ubDAuxDibrn5aGeXy5X3zWDQc4YbzPSjU-GHRzkrAhramXTWGFPRPCH9haVncMpU2beCabP5jxV1CYdKdT-Wka6V3V4tftsx-5coagmHNXZukVkZqZaROxjraCGjMWQdt9C_PRle1245IVE4WbF68qrByZMDXb9KKYlrhyHAbbVX7CNx3-t9Ba9p8Q19b3SV30S9AAi6RgFdIwC0kYIcEDEjADgm4QQIG7eA2EvCDwYAEXCPhO7o7PxueXvjVNA1fBhHNfTtoQGUk0TQRUaR5KBhTmggw0DLhrlFbICAAp4qEcU_DvlzEXAoiBNxXYfgDdczM6D2EAyJVFoh7iPVY1ItgoZawl1fhfch6EHXtI1J_nVRWrebtxJOn9P962Ude88zcNVp5Y_XPD60-QJsrjB6iTr4o9BH6Iv_A914cV0D4C4FvegA
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=RSS+based+multistage+statistical+method+for+attack+detection+and+localization+in+IoT+networks&rft.jtitle=Pervasive+and+mobile+computing&rft.au=Saxena%2C+Shubham&rft.au=Pandey%2C+Ankur&rft.au=Kumar%2C+Sudhir&rft.date=2022-09-01&rft.issn=1574-1192&rft.volume=85&rft.spage=101648&rft_id=info:doi/10.1016%2Fj.pmcj.2022.101648&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_pmcj_2022_101648
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-1192&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-1192&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-1192&client=summon