Cost optimization of secure routing with untrusted devices in software defined networking

A Yazdinejad, RM Parizi, A Dehghantanha… - Journal of Parallel and …, 2020 - Elsevier
secure and scalable routing protocol for IoT networks (SARP). Indeed, SARP gives attestation
in large scale IoT networks and … introduced secure ID-based signatures for secure routing …

An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN

K Haseeb, A Almogren, N Islam, I Ud Din, Z Jan - Energies, 2019 - mdpi.com
… that allows electromagnetic fields to transfer the identification … the network field produces a
number based on random strategy … BS minimizes energy consumption and longer the network

Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing

A Telikani, J Shen, J Yang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
… class-dependent cost optimization mechanism. In the … and the stacked-deep polynomial
network for IoT security. In the … , and rapidity of random neural networks for IDS. Only a handful of …

A qos-aware service composition mechanism in the internet of things using a hidden-markov-model-based optimization algorithm

S Sefati, NJ Navimipour - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… has been known as the Internet of Things (IoT), where all … ) parameters, are recognized in
the IoT domain. Since this issue is … can be brought into the IoT, depending on users’ demands. …

A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks

BD Deebak, F Al-Turjman - Ad Hoc Networks, 2020 - Elsevier
… In literature, IDS based learning mechanisms have been … In random Ad hoc sensor
networks, the sensor nodes are … [37] merged the DSR routing with ant-colony optimization to …

Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things

K Haseeb, N Islam, A Almogren, IU Din - Ieee Access, 2019 - ieeexplore.ieee.org
Based on the random number, a preset of a number of nodes … and reliable data security
mechanisms based on XOR hash … On the other hand, our proposed framework minimizes the …

[HTML][HTML] Network optimizations in the Internet of Things: A review

NN Srinidhi, SMD Kumar, KR Venugopal - Engineering Science and …, 2019 - Elsevier
… where we present the need for network optimization in IoT, … LTE Random Access Channel
(RACH) mechanism. This … author in [91], proposes a data offloading mechanism based

Cost-aware feature selection for IoT device classification

B Chakraborty, DM Divakaran, I Nevat… - … Internet of Things …, 2021 - ieeexplore.ieee.org
… (CE)-based stochastic optimization technique. Using traffic of … for device identification (or
classification) should take the cost of … the broad areas of network and system security, security …

Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
IoT security threats and challenges for IoT networks by evaluating existing defense techniques.
Our main focus is on network … detail IoT security challenges such as Object identification, …

Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks

R Nagaraju, SB Goyal, C Verma, CO Safirescu… - Energies, 2022 - mdpi.com
… key, a random number, termed … ID of the destination is identical to its ID, the pairwise key
is encrypted, MAC is verified and the encrypted packet of neighbor with nonce as well as its ID