Two-Phase Security Protection for the Internet of Things Object


Vera Suryani, Selo Sulistyo, Widyawan Widyawan, Journal of Information Processing Systems
Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Fulltext:

Abstract

Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase security protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Vera Suryani, Selo Sulistyo, & Widyawan Widyawan (2018). Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14(6), 1431-1437. DOI: 10.3745/JIPS.03.0106.

[IEEE Style]
V. Suryani, S. Sulistyo and W. Widyawan, "Two-Phase Security Protection for the Internet of Things Object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018. DOI: 10.3745/JIPS.03.0106.

[ACM Style]
Vera Suryani, Selo Sulistyo, and Widyawan Widyawan. 2018. Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14, 6, (2018), 1431-1437. DOI: 10.3745/JIPS.03.0106.