Internet of things (IoTs) security: Intrusion detection using deep learning

OK Sahingoz, U Cekmez… - Journal of Web …, 2021 - ieeexplore.ieee.org
With the development of sensor and communication technologies, the use of connected
devices in industrial applications has been common for a long time. Reduction of costs …

Intrusion detection of wormhole attack in IoT: A review

M Goyal, M Dutta - … Conference on Circuits and Systems in …, 2018 - ieeexplore.ieee.org
Internet of Things is a new paradigm that is rapidly making progress in the present wireless
communications. It semantically implies a worldwide network of connected objects, uniquely …

Deep learning-enabled threat intelligence scheme in the internet of things networks

M Al-Hawawreh, N Moustafa, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …

A Novel Detection and Localization Scheme for Wormhole Attack in the Internet of Things

F Tong, C Chen, J Pan - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the explosive growth of Internet-of-Things (IoT) devices, the IPv6 Routing Protocol for
Low-Power and Lossy Networks (RPL) has been widely studied and applied. However, due …

An automata based intrusion detection method for internet of things

Y Fu, Z Yan, J Cao, O Koné… - Mobile Information Systems, 2017 - Wiley Online Library
Internet of Things (IoT) transforms network communication to Machine‐to‐Machine (M2M)
basis and provides open access and new services to citizens and companies. It extends the …

Defending against new-flow attack in sdn-based internet of things

T Xu, D Gao, P Dong, H Zhang, CH Foh… - IEEE Access, 2017 - ieeexplore.ieee.org
Recently, the Internet of Things (IoT) is attracting significant attention from both academia
and industry. To connect the huge amount of IoT devices effectively, software-defined …

Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks

RK Sundararajan, U Arumugam - Journal of Sensors, 2015 - Wiley Online Library
In wireless sensor network (WSN), the sensors are deployed and placed uniformly to
transmit the sensed data to a centralized station periodically. So, the major threat of the WSN …

Multiattack intrusion detection algorithm for edge-assisted internet of things

D Wu, J Yan, H Wang, R Wang - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
With the continuous development of edge-assisted internet of things (IoT) applications, a
large number of computing tasks need to be offloaded into the edge servers. It is critical to …

Efficient intrusion detection toward IoT networks using cloud–edge collaboration

R Yang, H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) is increasingly utilized in daily life and industrial
production, particularly in critical infrastructures. IoT cybersecurity has an effect on people's …

[PDF][PDF] Detection of malicious nodes in IoT networks based on packet loss using ML

KKS Liyakat - Journal of Mobile Computing, Communications & …, 2022 - researchgate.net
Devices can now effortlessly and wirelessly share data with one another through the internet
or other networked systems thanks to newly created technology known as Internet of Things …