9 Smart Trust Management Scheme for Detecting Attacks in IoT and Ubiquitous Computing

A. Sivasangari, R. M. Gomathi, A. Jesudoss, L. Lakshmanan, K. Indira, and T. Samraj Lawrence

CONTENTS

9.1 Introduction

9.1.1 Security Issues

9.2 Related Work

9.3 Proposed Work

9.3.1 Clustering Algorithm

9.3.2 Data Clustering and Labelling Algorithm

9.3.2.1 Authentication and Access Control

9.3.2.2 Detection of Abnormal Behaviour Using k-Means Algorithm

9.4 Performance Analysis

9.5 Conclusion

References

9.1 Introduction

The Internet of Things (IoT) is quite the most powerful technology available today. The Internet’s ubiquity, the rising network connection capability, and the diversity of connected devices make the IoT versatile and adaptable. Food production, ...

Get Industry 4.0 Interoperability, Analytics, Security, and Case Studies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.