Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT)
P. Rutravigneshwaran (),
G. Anitha () and
K. Prathapchandran ()
Additional contact information
P. Rutravigneshwaran: Karpagam Academy of Higher Education
G. Anitha: Karpagam Academy of Higher Education
K. Prathapchandran: Nehru Arts and Science College (Autonomous)
International Journal of System Assurance Engineering and Management, 2024, vol. 15, issue 1, No 26, 287-299
Abstract:
Abstract The Internet of Things is an advanced and prominent wireless technology that enables our daily lives easier and more comfortable. The same way it is getting more attention in the military environment and the result of the application is Internet of Battle Field Things (IoBT). IoBT offers many advantages to the battle field environment and at the same time it is getting attention from a security perspective. The battle field things are affected by various attacks because of their significant nature among black hole attack is one of the considerable attacks that affects the IoBT environment more seriously. It is caused by lack of authentication. The battle field things are communicating with other battlefield things without any prior interactions and communications. This blindness leads to security violations. To overcome these issues, in this paper Trust based Support Vector Regression has been proposed. The aim is to detect and eliminate black hole attacks by the way authentication can be ensured. The proposed method makes use of multiple trust metrics to evaluate the trustworthiness of particular IoBT things. Besides, the machine learning algorithm, called Support Vector Regression, is used to classify the black hole nodes and also it predicts the future behaviors of the battle field things. The proposed model has been analyzed in terms of simulation results and this model has been compared with traditional Routing Protocol for Low Power Lossy Network and existing similar model. The proposed model shows prominent results compared with other two models.
Keywords: Authentication; Black hole attack; IoBT; IoT; RPL; Security; TSVR (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s13198-022-01719-w Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:15:y:2024:i:1:d:10.1007_s13198-022-01719-w
Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198
DOI: 10.1007/s13198-022-01719-w
Access Statistics for this article
International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar
More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().