9 Smart Trust Management Scheme for Detecting Attacks in IoT and Ubiquitous Computing
A. Sivasangari, R. M. Gomathi, A. Jesudoss, L. Lakshmanan, K. Indira, and T. Samraj Lawrence
CONTENTS
9.3.2 Data Clustering and Labelling Algorithm
9.3.2.1 Authentication and Access Control
9.3.2.2 Detection of Abnormal Behaviour Using k-Means Algorithm
9.1 Introduction
The Internet of Things (IoT) is quite the most powerful technology available today. The Internet’s ubiquity, the rising network connection capability, and the diversity of connected devices make the IoT versatile and adaptable. Food production, ...