{"id":"https://openalex.org/W4400727418","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592570","title":"Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks","display_name":"Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400727418","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592570"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094273251","display_name":"Floribert Katembo Vuseghesa","orcid":null},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Floribert Katembo Vuseghesa","raw_affiliation_strings":["Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France"],"affiliations":[{"raw_affiliation_string":"Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France","institution_ids":["https://openalex.org/I100532134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035000065","display_name":"Mohamed\u2010Lamine Messai","orcid":"https://orcid.org/0000-0003-0376-0657"},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed-Lamine Messai","raw_affiliation_strings":["Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France"],"affiliations":[{"raw_affiliation_string":"Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France","institution_ids":["https://openalex.org/I100532134"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104633503","display_name":"Fadila Bentayeb","orcid":null},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Fadila Bentayeb","raw_affiliation_strings":["Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France"],"affiliations":[{"raw_affiliation_string":"Univ Lyon, Univ Lyon 2,UR ERIC,Bron,France","institution_ids":["https://openalex.org/I100532134"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094273251"],"corresponding_institution_ids":["https://openalex.org/I100532134"],"apc_list":null,"apc_paid":null,"fwci":0.7305,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71219667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"445","last_page":"450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7374883890151978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6590814590454102},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.644906759262085},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5936622023582458},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5763030648231506},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1027536392211914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7374883890151978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6590814590454102},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.644906759262085},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5936622023582458},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5763030648231506},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1027536392211914},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04750777v1","is_oa":false,"landing_page_url":"https://hal.science/hal-04750777","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC), May 2024, Ayia Napa, France. pp.445-450, &#x27E8;10.1109/IWCMC61514.2024.10592570&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2167529272","https://openalex.org/W2395187259","https://openalex.org/W2892908011","https://openalex.org/W2965721472","https://openalex.org/W3048339221","https://openalex.org/W3130279822","https://openalex.org/W3172481093","https://openalex.org/W3177518343","https://openalex.org/W3192770481","https://openalex.org/W4220885173","https://openalex.org/W4310878606","https://openalex.org/W4311457580","https://openalex.org/W4311537240","https://openalex.org/W4319300737","https://openalex.org/W4322576473","https://openalex.org/W4366091323","https://openalex.org/W4384103781","https://openalex.org/W4385187275","https://openalex.org/W4393286899","https://openalex.org/W6847074474"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"The":[0,59,166],"emergence":[1],"of":[2,5,12,15,24,49,145],"the":[3,19,22,32,47,78,109,131,175,180],"Internet":[4],"Things":[6],"(IoT)":[7],"networks":[8],"as":[9,127],"a":[10,87],"source":[11],"large":[13],"amount":[14],"data":[16,39,76],"has":[17,45],"paved":[18],"way":[20],"for":[21,56,91],"adoption":[23],"machine":[25,128],"learning":[26,129],"models.":[27],"Divers":[28],"datasets,":[29],"used":[30],"in":[31,143,149],"training":[33,80],"phase,":[34],"are":[35],"issued":[36],"by":[37,100],"collected":[38,110,119],"from":[40,108],"deployed":[41],"IoT":[42],"networks.":[43],"This":[44,138],"attracted":[46],"attention":[48],"adversaries":[50,60],"seeking":[51],"to":[52,64,95,115,134,156],"exploit":[53],"these":[54,66],"models":[55,67],"their":[57,106],"gain.":[58],"compromise":[61],"IoT/sensor":[62],"nodes":[63,103],"manipulate":[65],"through":[68],"poisoning":[69,98,183],"attacks":[70,99],"wherein":[71],"they":[72],"introduce":[73],"carefully":[74],"malicious":[75],"into":[77],"model\u2019s":[79],"dataset.":[81],"In":[82],"this":[83,123],"paper,":[84],"we":[85,125],"propose":[86],"framework,":[88],"namely":[89],"NoComP":[90,112,158,173],"Node":[92],"Compromising":[93],"detection,":[94],"defend":[96],"against":[97,182],"detecting":[101,150],"compromised":[102,136],"and":[104,147,159,168,178],"delete":[105],"readings":[107],"data.":[111,121],"prevents":[113],"datasets":[114],"be":[116],"mixed":[117],"poisonous":[118],"sensed":[120],"To":[122],"end,":[124],"use":[126],"algorithm":[130,139],"neural":[132],"network":[133],"detect":[135],"nodes.":[137],"offer":[140],"significant":[141],"advantages":[142],"terms":[144],"efficiency":[146,169],"accuracy":[148,167],"anomalies.":[151],"We":[152],"carry":[153],"out":[154],"experiments":[155],"evaluate":[157],"compare":[160],"it":[161],"with":[162],"two":[163],"existing":[164,176],"proposals.":[165],"results":[170],"shows":[171],"that":[172],"outperforms":[174],"ones":[177],"improves":[179],"robustness":[181],"attacks.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
