KLI

The Detection of Malicious Nodes from IoT

Metadata Downloads
Abstract
IoT infrastructure to gain access to potentially useful information. The devices in the IoT are capable of producing, processing, and exchanging not only the enormous volume of data related to security and safety but the privacy-sensitive information also. Thus, several attacks are inclined towards these devices. Location protection is the denial of service attack which reduces network performance. The technique is proposed in this research work is based on the threshold and monitor mode for the detection of malicious nodes. The proposed methodology is implemented in NS2 and results are analyzed in terms of throughput, packet loss, and delay.
Author(s)
사이니 죠티
Issued Date
2021
Awarded Date
2021-08
Type
Dissertation
URI
https://oak.ulsan.ac.kr/handle/2021.oak/5579
http://ulsan.dcollection.net/common/orgView/200000502715
Affiliation
울산대학교
Department
산업대학원 스마트IT융합
Advisor
UiPil Chong
Degree
Master
Publisher
울산대학교 산업대학원 스마트IT융합
Language
eng
Appears in Collections:
Industry > Smart IT Convergence Engineering
Authorize & License
  • Authorize공개
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.