[PDF][PDF] Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja

A Farea, K Küçük - International Journal of Computer Network and …, 2024 - researchgate.net
The Internet of Things (IoT) is one of the promising technologies of the future. It offers many
attractive features that we depend on nowadays with less effort and faster in real-time …

Intrusion detection of wormhole attack in IoT: A review

M Goyal, M Dutta - … Conference on Circuits and Systems in …, 2018 - ieeexplore.ieee.org
Internet of Things is a new paradigm that is rapidly making progress in the present wireless
communications. It semantically implies a worldwide network of connected objects, uniquely …

An effective classification for DoS attacks in wireless sensor networks

T Park, D Cho, H Kim - 2018 Tenth international conference …, 2018 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) have an important role in detecting and preventing
security attacks. An IDS should be in Wireless Sensor Networks (WSN) to ensure the …

TD-RA policy-enforcement framework for an SDN-based IoT architecture

S Lahlou, Y Moukafih, A Sebbar, K Zkik… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Things (IoT) has been suffering from increasing security threats since
many years which compromise the whole network security. Automating the management of …

Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks

R Singh, J Singh, R Singh - Wireless Communications and …, 2017 - Wiley Online Library
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically
detects the WSNs attacks is proposed. AHIDS makes use of cluster‐based architecture with …

Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things

YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …

Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

T Sahraneshin, R Malekhosseini, F Rad… - Wireless …, 2023 - Springer
Abstract The Internet of Things, also called IoT for short, consists of billions of devices
distributed around the world, all of which are connected through the Internet. Data is …

Survey on intrusion detection system in IoT network

SA Mehdi, SZ Hussain - … : Proceedings of ICICC 2022, Volume 2, 2022 - Springer
Abstract Internet of Things (IoT) has emerged as a powerful communication and networking
system for smart and automation processing. With the increasing usage of the Internet of …

Red kite optimization algorithm with average ensemble model for intrusion detection for secure IoT

FF Alruwaili, MM Asiri, FS Alrayes, SS Aljameel… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) based Wireless Sensor Networks (WSNs) contain
interconnected autonomous sensor nodes (SN), which wirelessly communicate with each …

[PDF][PDF] Design of detection engine for wormhole attack in adhoc network environment

H Shahnawaz, RC Joshi, SC Gupta - Published in International …, 2013 - academia.edu
Adhoc network is a collection of nodes that are capable to form dynamically a temporary
network without the support of any centralized fixed infrastructure. There is no central …