RSS based multistage statistical method for attack detection and localization in IoT networks
Gespeichert in:
| Veröffentlicht in: | Pervasive and mobile computing Jg. 85; S. 101648 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
01.09.2022
|
| ISSN: | 1574-1192 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| ArticleNumber | 101648 |
|---|---|
| Author | Pandey, Ankur Kumar, Sudhir Saxena, Shubham |
| Author_xml | – sequence: 1 givenname: Shubham surname: Saxena fullname: Saxena, Shubham – sequence: 2 givenname: Ankur orcidid: 0000-0001-6820-9722 surname: Pandey fullname: Pandey, Ankur – sequence: 3 givenname: Sudhir surname: Kumar fullname: Kumar, Sudhir |
| BookMark | eNp9kMtOwzAQRb0oEm3hB1j5B1I8jpPYS1TxqFSpEi1LFPlVcJrElW2E4OtJWlYs2MyM7sy9Gp0ZmvS-twjdAFkAgfK2WRw73SwoofQkMD5BUygqlgEIeolmMTaEMGAVmaLX5-0WKxmtwd1Hm1xM8s3ioY6j07LFnU3v3uC9D1imJPUBG5usTs73WPYGt364ct_yJLger_wO9zZ9-nCIV-hiL9tor3_7HL083O-WT9l687ha3q0zTVmVspIX3EgobVUqxqzIFefGgqpErksBlSAFUMULqAzkBbGUCVUIrUCpYW_yfI74OVcHH2Ow-1q7dPooBenaGkg9kqibekRTj2jqM5rBSv9Yj8F1Mnz9Z_oBcGht8Q |
| CitedBy_id | crossref_primary_10_1016_j_segan_2024_101534 crossref_primary_10_1109_JIOT_2023_3343611 crossref_primary_10_1109_JSEN_2024_3504259 crossref_primary_10_1007_s42979_025_04211_x crossref_primary_10_1016_j_pmcj_2025_102082 |
| Cites_doi | 10.1109/COMST.2019.2896380 10.1109/JIOT.2020.2992651 10.1504/IJAHUC.2014.066419 10.1109/TDSC.2018.2889729 10.1145/1062689.1062697 10.1090/S0002-9939-98-04151-3 10.1109/COMST.2019.2911558 10.1109/COMST.2018.2844742 10.1109/ACCESS.2018.2843325 10.1016/j.measurement.2017.05.034 10.1109/JIOT.2020.3047982 10.4304/jcm.6.6.460-470 10.1109/MCOM.2008.4481347 10.1109/TIFS.2017.2668062 10.1109/JSAC.2005.861381 10.1109/ACCESS.2019.2945539 10.1007/s40815-015-0009-4 10.1090/S0025-5718-1975-0393393-9 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.pmcj.2022.101648 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| ExternalDocumentID | 10_1016_j_pmcj_2022_101648 |
| GroupedDBID | --K --M .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ 9DU AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO AAYXX ABBOA ABFRF ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACLOT ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADMUD ADNMO ADTZH AEBSH AECPX AEFWE AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP AXJTR BJAXD BKOJK BLXMC CITATION CS3 DU5 EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ SCC SDF SDG SES SPC SPCBC SST SSV SSZ T5K UNMZH ~G- ~HD |
| ID | FETCH-LOGICAL-c247t-6858da16e76b44e93b88de1b793c691790512b8517d1350e249b59cb1bbc69d33 |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000855578800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1574-1192 |
| IngestDate | Tue Nov 18 22:36:26 EST 2025 Sat Nov 29 07:01:00 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c247t-6858da16e76b44e93b88de1b793c691790512b8517d1350e249b59cb1bbc69d33 |
| ORCID | 0000-0001-6820-9722 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_pmcj_2022_101648 crossref_primary_10_1016_j_pmcj_2022_101648 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-09-00 |
| PublicationDateYYYYMMDD | 2022-09-01 |
| PublicationDate_xml | – month: 09 year: 2022 text: 2022-09-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Pervasive and mobile computing |
| PublicationYear | 2022 |
| References | Chaabouni (10.1016/j.pmcj.2022.101648_b16) 2019; 21 Shim (10.1016/j.pmcj.2022.101648_b12) 2017; 12 Chen (10.1016/j.pmcj.2022.101648_b5) 2006 Pandey (10.1016/j.pmcj.2022.101648_b1) 2020; 8 Sadowski (10.1016/j.pmcj.2022.101648_b29) 2018; 6 Zhang (10.1016/j.pmcj.2022.101648_b35) 1998; 126 Boukerche (10.1016/j.pmcj.2022.101648_b13) 2008; 46 Zafari (10.1016/j.pmcj.2022.101648_b32) 2019; 21 Kushki (10.1016/j.pmcj.2022.101648_b31) 2008 Lazos (10.1016/j.pmcj.2022.101648_b10) 2006; 24 Santoro (10.1016/j.pmcj.2022.101648_b26) 2017; 109 Saxena (10.1016/j.pmcj.2022.101648_b4) 2019 Aboelnaga (10.1016/j.pmcj.2022.101648_b8) 2018 Pires (10.1016/j.pmcj.2022.101648_b22) 2004 Sedjelmaci (10.1016/j.pmcj.2022.101648_b28) 2013 Sasikala (10.1016/j.pmcj.2022.101648_b27) 2015; 17 Islam (10.1016/j.pmcj.2022.101648_b37) 2017 Yan (10.1016/j.pmcj.2022.101648_b6) 2017; 11 Marshall (10.1016/j.pmcj.2022.101648_b34) 1979 Bhattacharjee (10.1016/j.pmcj.2022.101648_b9) 2018; 18 10.1016/j.pmcj.2022.101648_b23 10.1016/j.pmcj.2022.101648_b25 Pandey (10.1016/j.pmcj.2022.101648_b21) 2019; 7 Sadowski (10.1016/j.pmcj.2022.101648_b36) 2020; 7 Cheng (10.1016/j.pmcj.2022.101648_b7) 2017 Benkhelifa (10.1016/j.pmcj.2022.101648_b2) 2018; 20 Tung (10.1016/j.pmcj.2022.101648_b33) 1975; 29 Grover (10.1016/j.pmcj.2022.101648_b18) 2014; 17 Goldsmith (10.1016/j.pmcj.2022.101648_b30) 2005 Laoudias (10.1016/j.pmcj.2022.101648_b20) 2010 Conti (10.1016/j.pmcj.2022.101648_b3) 2018 Srinivasan (10.1016/j.pmcj.2022.101648_b15) 2007 Richter (10.1016/j.pmcj.2022.101648_b17) 2018 Lazos (10.1016/j.pmcj.2022.101648_b11) 2005 Chen (10.1016/j.pmcj.2022.101648_b24) 2007 Langendoerfer (10.1016/j.pmcj.2022.101648_b19) 2011; 15 Jiang (10.1016/j.pmcj.2022.101648_b14) 2011; 6 |
| References_xml | – volume: 21 start-page: 2671 issue: 3 year: 2019 ident: 10.1016/j.pmcj.2022.101648_b16 article-title: Network intrusion detection for IoT security based on learning techniques publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2896380 – start-page: 126 year: 2007 ident: 10.1016/j.pmcj.2022.101648_b15 article-title: A survey on secure localization in wireless sensor networks – start-page: 1964 year: 2007 ident: 10.1016/j.pmcj.2022.101648_b24 article-title: Attack detection in wireless localization – start-page: 24 year: 2004 ident: 10.1016/j.pmcj.2022.101648_b22 article-title: Malicious node detection in wireless sensor networks – volume: 7 start-page: 10996 issue: 11 year: 2020 ident: 10.1016/j.pmcj.2022.101648_b36 article-title: Memoryless techniques and wireless technologies for indoor localization with the internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.2992651 – start-page: 1 year: 2017 ident: 10.1016/j.pmcj.2022.101648_b37 – start-page: 1 year: 2018 ident: 10.1016/j.pmcj.2022.101648_b17 article-title: Attack tolerance of RSS-based fingerprinting – start-page: 324 year: 2005 ident: 10.1016/j.pmcj.2022.101648_b11 article-title: ROPE: Robust position estimation in wireless sensor networks – year: 1979 ident: 10.1016/j.pmcj.2022.101648_b34 – start-page: 543 year: 2018 ident: 10.1016/j.pmcj.2022.101648_b8 article-title: Secure Wi-Fi fingerprinting-based localization – volume: 17 start-page: 197 issue: 4 year: 2014 ident: 10.1016/j.pmcj.2022.101648_b18 article-title: Jamming and anti-jamming techniques in wireless networks: A survey publication-title: Int. J. Ad Hoc Ubiquitous Comput. doi: 10.1504/IJAHUC.2014.066419 – volume: 18 start-page: 356 issue: 1 year: 2018 ident: 10.1016/j.pmcj.2022.101648_b9 article-title: Detection and forensics against stealthy data falsification in smart metering infrastructure publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2018.2889729 – start-page: 546 year: 2006 ident: 10.1016/j.pmcj.2022.101648_b5 article-title: The robustness of localization algorithms to signal strength attacks: A comparative study – start-page: 1 year: 2019 ident: 10.1016/j.pmcj.2022.101648_b4 article-title: A multistage RSSI-based scheme for node compromise detection in IoT networks – ident: 10.1016/j.pmcj.2022.101648_b25 doi: 10.1145/1062689.1062697 – volume: 126 start-page: 461 issue: 2 year: 1998 ident: 10.1016/j.pmcj.2022.101648_b35 article-title: Schur-convex functions and isoperimetric inequalities publication-title: Proc. Amer. Math. Soc. doi: 10.1090/S0002-9939-98-04151-3 – volume: 21 start-page: 2568 issue: 3 year: 2019 ident: 10.1016/j.pmcj.2022.101648_b32 article-title: A survey of indoor localization systems and technologies publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2911558 – volume: 20 start-page: 3496 issue: 4 year: 2018 ident: 10.1016/j.pmcj.2022.101648_b2 article-title: A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2018.2844742 – volume: 6 start-page: 30149 year: 2018 ident: 10.1016/j.pmcj.2022.101648_b29 article-title: RSSI-based indoor localization with the Internet of things publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2843325 – volume: 109 start-page: 79 year: 2017 ident: 10.1016/j.pmcj.2022.101648_b26 article-title: A hybrid intrusion detection system for virtual jamming attacks on wireless networks publication-title: Measurement doi: 10.1016/j.measurement.2017.05.034 – volume: 8 start-page: 10665 issue: 13 year: 2020 ident: 10.1016/j.pmcj.2022.101648_b1 article-title: Adaptive mini-batch gradient-ascent-based localization for indoor IoT networks under Rayleigh fading conditions publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3047982 – year: 2018 ident: 10.1016/j.pmcj.2022.101648_b3 – volume: 6 start-page: 460 issue: 6 year: 2011 ident: 10.1016/j.pmcj.2022.101648_b14 article-title: Secure localization in wireless sensor networks: A survey publication-title: J. Commun. doi: 10.4304/jcm.6.6.460-470 – volume: 46 start-page: 96 issue: 4 year: 2008 ident: 10.1016/j.pmcj.2022.101648_b13 article-title: Secure localization algorithms for wireless sensor networks publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2008.4481347 – volume: 12 start-page: 1545 issue: 7 year: 2017 ident: 10.1016/j.pmcj.2022.101648_b12 article-title: BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2668062 – volume: 24 start-page: 233 issue: 2 year: 2006 ident: 10.1016/j.pmcj.2022.101648_b10 article-title: HiRLoc: High-resolution robust localization for wireless sensor networks publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2005.861381 – start-page: 1 year: 2017 ident: 10.1016/j.pmcj.2022.101648_b7 article-title: Time series analysis for jamming attack detection in wireless networks – start-page: 2065 year: 2008 ident: 10.1016/j.pmcj.2022.101648_b31 article-title: Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning – volume: 15 start-page: 39 year: 2011 ident: 10.1016/j.pmcj.2022.101648_b19 article-title: Demonstrating self-contained on-node counter measures for various jamming attacks in wireless sensor networks publication-title: SIGMOBILE Mob. Comput. Commun. Rev – volume: 11 issue: 9 year: 2017 ident: 10.1016/j.pmcj.2022.101648_b6 article-title: Attack-resistant received signal strength based compressive sensing wireless localization publication-title: KSII Trans. Internet. Inf. Syst. – volume: 7 start-page: 144354 year: 2019 ident: 10.1016/j.pmcj.2022.101648_b21 article-title: Handling device heterogeneity and orientation using multistage regression for GMM based localization in IoT networks publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2945539 – volume: 17 start-page: 76 issue: 1 year: 2015 ident: 10.1016/j.pmcj.2022.101648_b27 article-title: An intelligent technique to detect jamming attack in wireless sensor networks (WSNs) publication-title: Int. J. Fuzzy Syst. doi: 10.1007/s40815-015-0009-4 – volume: 29 start-page: 834 issue: 131 year: 1975 ident: 10.1016/j.pmcj.2022.101648_b33 article-title: On lower and upper bounds of the difference between the arithmetic and the geometric mean publication-title: Math. Comp. doi: 10.1090/S0025-5718-1975-0393393-9 – start-page: 1 year: 2010 ident: 10.1016/j.pmcj.2022.101648_b20 article-title: Fault tolerant positioning using WLAN signal strength fingerprints – ident: 10.1016/j.pmcj.2022.101648_b23 – start-page: 1 year: 2013 ident: 10.1016/j.pmcj.2022.101648_b28 article-title: Efficient and lightweight intrusion detection based on nodes’ behaviors in wireless sensor networks – year: 2005 ident: 10.1016/j.pmcj.2022.101648_b30 |
| SSID | ssj0041470 |
| Score | 2.3336432 |
| SourceID | crossref |
| SourceType | Enrichment Source Index Database |
| StartPage | 101648 |
| Title | RSS based multistage statistical method for attack detection and localization in IoT networks |
| Volume | 85 |
| WOSCitedRecordID | wos000855578800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 1574-1192 databaseCode: AIEXJ dateStart: 20050301 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0041470 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9tAEF5B6IEeEJRWUB7aAzfLUdav3T1GCAQcECJByqWyvA8aAtlEwa7y8zvrtR1DVQQHLpZlr0eW59PM7PibGYROEqllAGGFLzQN_UjQzOcsk76kSUwFJ7EQvXLYBL2-ZqMRr__oPpfjBKgxbLnk809VNVwDZdvS2Q-ouxEKF-AclA5HUDsc36X428HAs75JObIgRH-_bRdZW8Xg8tZuaLSjT-Z5Jh89pXNdjQw3yivdW1WeadMhl7OhZxxb_Lkdy97YfG7JfrdPTWcCDExJUS_y2h_a1E221K7ubDAuxDibrn5aGeXy5X3zWDQc4YbzPSjU-GHRzkrAhramXTWGFPRPCH9haVncMpU2beCabP5jxV1CYdKdT-Wka6V3V4tftsx-5coagmHNXZukVkZqZaROxjraCGjMWQdt9C_PRle1245IVE4WbF68qrByZMDXb9KKYlrhyHAbbVX7CNx3-t9Ba9p8Q19b3SV30S9AAi6RgFdIwC0kYIcEDEjADgm4QQIG7eA2EvCDwYAEXCPhO7o7PxueXvjVNA1fBhHNfTtoQGUk0TQRUaR5KBhTmggw0DLhrlFbICAAp4qEcU_DvlzEXAoiBNxXYfgDdczM6D2EAyJVFoh7iPVY1ItgoZawl1fhfch6EHXtI1J_nVRWrebtxJOn9P962Ude88zcNVp5Y_XPD60-QJsrjB6iTr4o9BH6Iv_A914cV0D4C4FvegA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=RSS+based+multistage+statistical+method+for+attack+detection+and+localization+in+IoT+networks&rft.jtitle=Pervasive+and+mobile+computing&rft.au=Saxena%2C+Shubham&rft.au=Pandey%2C+Ankur&rft.au=Kumar%2C+Sudhir&rft.date=2022-09-01&rft.issn=1574-1192&rft.volume=85&rft.spage=101648&rft_id=info:doi/10.1016%2Fj.pmcj.2022.101648&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_pmcj_2022_101648 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-1192&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-1192&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-1192&client=summon |