Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
… Authors also classified host-based and network-based … IoT attacks as goal, performer, and
layered where DoS, MITM and selective forwarding attacks are addressed as critical IoT attack

A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things

SS Ullah, I Ullah, H Khattak, MA Khan, M Adnan… - IEEE …, 2020 - ieeexplore.ieee.org
… contents can be stored and forwarded in the entire network and hence can cause a massive
disaster for the clients. A general scenario of content poisoning attack is shown in the Figure …

Effective attack detection in internet of medical things smart environment using a deep belief neural network

S Manimurugan, S Al-Mutairi, MM Aborokbah… - IEEE …, 2020 - ieeexplore.ieee.org
… Thus, there is an essential need to develop an intrusion detection system for attack and …
Belief Network (DBN) algorithm model for the intrusion detection system. Regarding the attacks

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
… , goals and methods of security attack, and identify why IoT … of security attacks based on a
three-layered (application, network and … of the network at various times into a forward network. …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… This research aims to highlight the potential security attacks for routing in IoT networks.
Additionally, … nodes and forwarded later in the network. There are various ways in which a Replay …

Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
… , cloud computing, and Internet of Things (IoT), the information security in wireless sensor …
against black hole attacks and selective forwarding attacks. Sahoo et al. put forward a trust …

Network flow based IoT botnet attack detection using deep learning

S Sriram, R Vinayakumar, M Alazab… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
… The expansion in the quantity of Internet-of-things (IoT) based botnet attacks is due to the …
used for detecting 2 routing attacks called sinkhole and selective forwarding attacks in IoT. …

Fog-based attack detection framework for internet of things using deep learning

A Samy, H Yu, H Zhang - Ieee Access, 2020 - ieeexplore.ieee.org
… Smart gateways work as sink nodes, they collect the traffic exchanged in the network and
forward it to the nearest fog node. Fog nodes receive network traffic forwarded from several IoT …

A novel and secure attacks detection framework for smart cities industrial internet of things

KN Qureshi, SS Rana, A Ahmed, G Jeon - Sustainable Cities and Society, 2020 - Elsevier
… Protocol for Low- power and Lossy Networks (RPL) which is generally susceptible to a
wide range of attacks in IoT and IIoT networks such as selective forwarding, and black hole …

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques

A Mihoub, OB Fredj, O Cheikhrouhou, A Derhab… - Computers & Electrical …, 2022 - Elsevier
… If the request is not raised as an attack, it will be forwarded to the AIDS. For training AIDS,
a Single-Class SVM is utilized, which learns the attributes of normal packets only. It does not …