Abstract

In this paper, we propose a two-tier ratio metric and Residue Under Curve (RUC) metric method to detect the compromised node for different attacks in the Internet of Things (IoT) framework. We compare the performance of the proposed method for Wireless Fidelity (Wi-Fi), Bluetooth Low Energy (BLE), Zigbee, and Long-Range Wide-Area Network (LoRaWAN) utilizing the Received Signal Strength (RSS) values of the signals. Additionally, the attack tolerance level of different protocols is investigated. The experiments are conducted on a popular IoT database. Results show that the proposed method successfully detects the compromised node for multiple IoT protocols.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call