Two-Phase Security Protection for the Internet of Things Object

Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Volume: 14, No: 6, Page: 1431 ~ 1437, Year: 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Full Text:

Abstract
Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase security protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
V. Suryani, S. Sulistyo and W. Widyawan, "Two-Phase Security Protection for the Internet of Things Object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431~1437, 2018. DOI: 10.3745/JIPS.03.0106.

ACM Style
Vera Suryani, Selo Sulistyo, and Widyawan Widyawan. 2018. Two-Phase Security Protection for the Internet of Things Object, Journal of Information Processing Systems, 14, 6, (2018), 1431~1437. DOI: 10.3745/JIPS.03.0106.