Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm

TAS Srinivas, SS Manivannan - Computer Communications, 2020 - Elsevier
IoT are prone to vulnerabilities as a result of a lack of centralized management, dynamic
topologies, and predefined boundary. There are diverse attacks that affect the performance …

Deep learning for detection of routing attacks in the internet of things

FY Yavuz, D Ünal, E Gül - International Journal of Computational …, 2018 - Springer
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an
industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of …

Threat analysis model to control IoT network routing attacks through deep learning approach

K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …

Monarch-EWA: Monarch-earthworm-based secure routing protocol in IoT

S Sugave, B Jagdale - The Computer Journal, 2020 - academic.oup.com
Routing in the Internet of Things (IoT) renders the protection against various network attacks
as any attacker intrudes the routing mechanism for establishing the destructive mechanisms …

A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks

M Rouissat, M Belkheir, IS Alsukayti, A Mokaddem - Applied Sciences, 2023 - mdpi.com
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

[PDF][PDF] Attack classification analysis of IoT network via deep learning approach

BA Tama, KH Rhee - Research Briefs on Information and …, 2017 - rebicte.org
Attack Classification Analysis of IoT Network via Deep Learning Approach Page 1 Attack
Classification Analysis of IoT Network via Deep Learning Approach Bayu Adhi Tama and …

AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
Abstract The Internet of things (IoT) is emerging as a prime area of research in the modern
era. The significance of IoT in the daily life is increasing due to the increase in objects or …

Deep learning approach-based network intrusion detection system for fog-assisted iot

N Sahar, R Mishra, S Kalam - … of international conference on big data …, 2021 - Springer
Abstract In an Internet of Things (IoT) network, miscellaneous devices exchange their
resources as per their requirement via the Internet. The data aggregated from these IoT …

Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment

S Pundir, M Wazid, DP Singh, AK Das, JJPC Rodrigues… - Sensors, 2020 - mdpi.com
The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can
devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes …