University of Bahrain
Scientific Journals

K-means clustering -based Trust (KmeansT) evaluation mechanism for detecting Blackhole attacks in IoT environment

Show simple item record

dc.contributor.author M. , Shameer
dc.contributor.author Gnanaprasanambikai, L.
dc.date.accessioned 2024-01-05T12:18:26Z
dc.date.available 2024-01-05T12:18:26Z
dc.date.issued 2024-01-02
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5289
dc.description.abstract The Internet of Things (IoT) has revolutionized numerous aspects of our lives, offering many applications that enhance convenience and comfort. However, alongside its significant benefits, IoT introduces several research challenges, with security emerging as a primary concern. Given the sensitive nature of the information exchanged within IoT environments, ensuring robust security measures is imperative. One prominent threat in IoT environments is the potential for malicious attacks, which can exploit vulnerabilities and disrupt network operations. Among these threats, blackhole attacks pose a particularly concerning risk, as they involve malicious entities dropping all incoming packets, disrupting routing operations, and impeding communication. To mitigate the risks posed by blackhole attacks and enhance the security of IoT networks, a novel approach known as the K-means clustering-based Trust (KmeansT) evaluation mechanism has been proposed. This innovative method employs a multifaceted trust evaluation process, incorporating both direct observations and recommendations from other network entities. By leveraging the K-means clustering algorithm, the proposed mechanism enhances the effectiveness of trust evaluation, enabling a more accurate assessment of node reliability and integrity. One of the key strengths of the KmeansT approach lies in its ability to identify and mitigate blackhole attacks within the IoT environment effectively. Through rigorous mathematical modeling and simulation studies, the efficacy of the proposed mechanism in detecting and neutralizing blackhole threats is demonstrated. Simulation results are analyzed comprehensively, with performance metrics compared against existing models to assess the effectiveness of the KmeansT approach. By evaluating constraints such as end-to-end delay, packet delivery, and detection ratio, the superiority of the anticipated mechanism in safeguarding IoT networks against blackhole attacks is underscored. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Internet of Things, Security, Blackhole attack, Trust and K-means clustering en_US
dc.title K-means clustering -based Trust (KmeansT) evaluation mechanism for detecting Blackhole attacks in IoT environment en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/160154
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 739 en_US
dc.pageend 751 en_US
dc.contributor.authorcountry India en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation Computer Science, Karpagam Academy of Higher Education en_US
dc.contributor.authoraffiliation Computer Science, Karpagam Academy of Higher Education en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account