Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of the network. It is a passive attack and can access the Medium Access Control address of some valid users in the network to continue malicious activities. In this paper, an algorithm is proposed for detecting spoofing attacks in IoT using Received Signal Strength (RSS) and Number of Connected Neighbors (NCN). Firstly, the spoofing attack is detected, located and eliminated through Received Signal Strength (RSS) in an inter-cluster network. However, the RSS is not useful against in...
Occupancy detection is beneficial for applications such as emergency management and building energy ...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The proposed security agent, Internet of Things Active Management Unit (IoTAMU), provides confidenti...
Abstract: The openness of wireless networks enables adversaries to deception as other devices. Spoof...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
In wireless networks, Spoofing attacks are easy to launch but it degrades the performance of the net...
A spoofing attack in a wireless network context occurs when a person unauthorized to access the netw...
Authentication protocols are powerful tools to ensure confidentiality as an important feature of Int...
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilit...
ABSTRACT -The computerized unrest has generously transformed ourselves in which Internet-of-Things (...
Wireless Networks are more vulnerable to spoofing attacks which can be launched easily and considere...
Internet of things (IoT) has brought a greater prevalence of smart objects with higher connectivity ...
Due to the widespread functional benefits, such as supporting internet connectivity, having high vis...
Wireless spoofing attacks are simple to introduce and can importantly impact the performance of netw...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
Occupancy detection is beneficial for applications such as emergency management and building energy ...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The proposed security agent, Internet of Things Active Management Unit (IoTAMU), provides confidenti...
Abstract: The openness of wireless networks enables adversaries to deception as other devices. Spoof...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
In wireless networks, Spoofing attacks are easy to launch but it degrades the performance of the net...
A spoofing attack in a wireless network context occurs when a person unauthorized to access the netw...
Authentication protocols are powerful tools to ensure confidentiality as an important feature of Int...
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilit...
ABSTRACT -The computerized unrest has generously transformed ourselves in which Internet-of-Things (...
Wireless Networks are more vulnerable to spoofing attacks which can be launched easily and considere...
Internet of things (IoT) has brought a greater prevalence of smart objects with higher connectivity ...
Due to the widespread functional benefits, such as supporting internet connectivity, having high vis...
Wireless spoofing attacks are simple to introduce and can importantly impact the performance of netw...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
Occupancy detection is beneficial for applications such as emergency management and building energy ...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The proposed security agent, Internet of Things Active Management Unit (IoTAMU), provides confidenti...