{"id":"https://openalex.org/W3036224308","doi":"https://doi.org/10.1109/ants47819.2019.9117939","title":"Preventing data tampering in IoT networks","display_name":"Preventing data tampering in IoT networks","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3036224308","doi":"https://doi.org/10.1109/ants47819.2019.9117939","mag":"3036224308"},"language":"en","primary_location":{"id":"doi:10.1109/ants47819.2019.9117939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants47819.2019.9117939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051836527","display_name":"Rajesh Shrivastava","orcid":"https://orcid.org/0000-0002-5656-9111"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajesh Kumar Shrivastava","raw_affiliation_strings":["Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","institution_ids":["https://openalex.org/I74796645"]},{"raw_affiliation_string":"Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069851219","display_name":"Sanket Mishra","orcid":"https://orcid.org/0000-0002-3193-8160"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanket Mishra","raw_affiliation_strings":["Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","institution_ids":["https://openalex.org/I74796645"]},{"raw_affiliation_string":"Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069928160","display_name":"V Archana","orcid":null},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. E Archana","raw_affiliation_strings":["Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","institution_ids":["https://openalex.org/I74796645"]},{"raw_affiliation_string":"Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063245652","display_name":"Chittaranjan Hota","orcid":"https://orcid.org/0000-0002-6031-6408"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chittaranjan Hota","raw_affiliation_strings":["Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science, Pilani,Department of Computer Science,Hyderabad Campus,India","institution_ids":["https://openalex.org/I74796645"]},{"raw_affiliation_string":"Department of Computer Science, Birla Institute of Technology and Science, Pilani, Hyderabad Campus, India","institution_ids":["https://openalex.org/I74796645"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051836527"],"corresponding_institution_ids":["https://openalex.org/I74796645"],"apc_list":null,"apc_paid":null,"fwci":0.6634,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71020007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7925955057144165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.72157883644104},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7187260985374451},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5896570682525635},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5716860294342041},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5385831594467163},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.43871474266052246},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4222428798675537},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4110866189002991},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2851232886314392},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2638566195964813},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.25432538986206055},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15198269486427307},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10002845525741577}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7925955057144165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72157883644104},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7187260985374451},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5896570682525635},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5716860294342041},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5385831594467163},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.43871474266052246},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4222428798675537},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4110866189002991},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2851232886314392},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2638566195964813},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.25432538986206055},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15198269486427307},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10002845525741577},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants47819.2019.9117939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants47819.2019.9117939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W44025674","https://openalex.org/W1980697618","https://openalex.org/W2013937942","https://openalex.org/W2076587863","https://openalex.org/W2093397575","https://openalex.org/W2111619626","https://openalex.org/W2161125296","https://openalex.org/W2280722976","https://openalex.org/W2526683572","https://openalex.org/W2591863697","https://openalex.org/W2737587176","https://openalex.org/W2765458940","https://openalex.org/W2784830313","https://openalex.org/W2904972287","https://openalex.org/W6734071730"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W4245926026","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W4242235492"],"abstract_inverted_index":{"Internet":[0],"of":[1,18,33,48,64,156],"Things":[2],"(IoT)":[3],"nodes":[4],"capture":[5],"enormous":[6],"data":[7,40,77,126,134],"pertaining":[8],"to":[9,37,81,91,103,114,136,147],"energy,":[10],"traffic,":[11],"home":[12],"automation,":[13],"etc.":[14],"with":[15,78],"the":[16,54,61,71,76,94,104,149],"help":[17],"sensors":[19,122],"stored":[20,51],"in":[21,132,153],"persistent":[22],"storage":[23],"systems,":[24],"such":[25],"as,":[26],"cloud":[27],"or":[28,59,83],"distributed":[29],"databases.":[30],"The":[31,46],"purpose":[32],"this":[34,39,110],"work":[35,107,143],"is":[36,63,89],"protect":[38],"from":[41],"corruption":[42],"by":[43,117,140],"an":[44,79,145],"adversary.":[45],"protection":[47],"IoT":[49,157],"data,":[50],"locally":[52],"on":[53,60,109],"device":[55],"(in":[56],"flash":[57],"storage)":[58],"servers,":[62],"paramount":[65],"importance.":[66],"An":[67],"adversary":[68,95],"can":[69],"breach":[70,88],"security":[72,87],"measures":[73],"and":[74,112],"access":[75,102],"intention":[80],"steal":[82],"corrupt":[84],"it.":[85],"This":[86,106,142],"difficult":[90],"identify":[92,137],"as":[93],"might":[96],"be":[97],"a":[98],"person":[99],"having":[100],"authorized":[101],"data.":[105,158],"leverages":[108],"issue":[111],"attempts":[113,139],"solve":[115],"it":[116],"using":[118],"Honey":[119,121],"sensors.":[120],"are":[123,129],"fake,":[124],"decoy":[125],"values":[127,135],"that":[128],"intentionally":[130],"injected":[131],"real":[133],"tampering":[138],"adversaries.":[141],"proposes":[144],"approach":[146],"automate":[148],"honey":[150],"sensor":[151],"injection":[152],"real-world":[154],"traces":[155]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
